You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@lucene.apache.org by "Stanislav Stolpovskiy (JIRA)" <ji...@apache.org> on 2013/06/20 10:56:21 UTC

[jira] [Commented] (SOLR-3419) XSS vulnerability in the json.wrf parameter

    [ https://issues.apache.org/jira/browse/SOLR-3419?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13689032#comment-13689032 ] 

Stanislav Stolpovskiy commented on SOLR-3419:
---------------------------------------------

I tried to reproduce this on Solr 3.4 and html characters were automatically escaped in my case. 
Does it mean that this vulnerability is present only in 3.5 version?
                
> XSS vulnerability in the json.wrf parameter
> -------------------------------------------
>
>                 Key: SOLR-3419
>                 URL: https://issues.apache.org/jira/browse/SOLR-3419
>             Project: Solr
>          Issue Type: Bug
>          Components: Response Writers
>    Affects Versions: 3.5
>            Reporter: Prafulla Kiran
>            Priority: Minor
>
> There's no filtering of the wrapper function name passed to the solr search service
> If the name of the wrapper function passed to the solr query service is the following string - 
> %3C!doctype%20html%3E%3Chtml%3E%3Cbody%3E%3Cimg%20src=%22x%22%20onerror=%22alert%281%29%22%3E%3C/body%3E%3C/html%3E
> solr passes the string back as-is which results in an XSS attack in browsers like IE-7 which perform mime-sniffing. In any case, the callback function in a jsonp response should always be sanitized - http://stackoverflow.com/questions/2777021/do-i-need-to-sanitize-the-callback-parameter-from-a-jsonp-call

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@lucene.apache.org
For additional commands, e-mail: dev-help@lucene.apache.org