You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@jena.apache.org by "Andy Seaborne (JIRA)" <ji...@apache.org> on 2016/01/31 16:33:39 UTC
[jira] [Resolved] (JENA-1123) Cross Site Scripting (XSS)
vulnerability on Fuseki 2.3.1
[ https://issues.apache.org/jira/browse/JENA-1123?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Andy Seaborne resolved JENA-1123.
---------------------------------
Resolution: Fixed
Assignee: Andy Seaborne
Fix Version/s: Fuseki 2.4.0
> Cross Site Scripting (XSS) vulnerability on Fuseki 2.3.1
> --------------------------------------------------------
>
> Key: JENA-1123
> URL: https://issues.apache.org/jira/browse/JENA-1123
> Project: Apache Jena
> Issue Type: Bug
> Components: Fuseki
> Affects Versions: Fuseki 2.3.1
> Reporter: Massimiliano Ricci
> Assignee: Andy Seaborne
> Priority: Critical
> Labels: security, xss
> Fix For: Fuseki 2.4.0
>
>
> In fuseki web interface, dataset.html page -> tab "query"
> it's possible to write query like:
> {noformat}
> SELECT
> ("<b>hello</b>" AS ?Y)
> ("<script>alert(document.domain)</script>" AS ?X)
> WHERE { }
> {noformat}
> that show a pop-up with hostname.
> Probably the problem is with the YASQE dependency.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)