You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@myfaces.apache.org by "rajat (JIRA)" <de...@myfaces.apache.org> on 2007/05/10 20:23:15 UTC
[jira] Created: (TOMAHAWK-983) Cross-site scripting in autoscroll
parameter
Cross-site scripting in autoscroll parameter
--------------------------------------------
Key: TOMAHAWK-983
URL: https://issues.apache.org/jira/browse/TOMAHAWK-983
Project: MyFaces Tomahawk
Issue Type: Bug
Components: AJAX Form Components
Environment: Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.7d
Reporter: rajat
The autoscroll parameter inserted in the requests is vulnerable to cross-site scripting attacks.
If the POST request containing the autoscroll parameter is fuzzed to include something on the lines of "autoScroll=0%2C275);//--></script><IMG%20src="bla"%20onerror="alert(document.cookie)"><script>( ", one can see the JavaScript pop-up. This appears to be a vulnerability throughout the JSF apps.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
[jira] Commented: (TOMAHAWK-983) Cross-site scripting in autoscroll
parameter
Posted by "rajat (JIRA)" <de...@myfaces.apache.org>.
[ https://issues.apache.org/jira/browse/TOMAHAWK-983?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12505214 ]
rajat commented on TOMAHAWK-983:
--------------------------------
Thanks Manfred for fixing this. In hindsight, it would have more sense to put it as critical as it was a universal issue. Will keep it in mind for future vulnerabilities ;-)
> Cross-site scripting in autoscroll parameter
> --------------------------------------------
>
> Key: TOMAHAWK-983
> URL: https://issues.apache.org/jira/browse/TOMAHAWK-983
> Project: MyFaces Tomahawk
> Issue Type: Bug
> Components: ExtensionsFilter
> Affects Versions: 1.1.1, 1.1.2, 1.1.3, 1.1.5
> Environment: Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.7d
> Reporter: rajat
> Assignee: Manfred Geiler
> Priority: Critical
> Fix For: 1.1.6
>
>
> The autoscroll parameter inserted in the requests is vulnerable to cross-site scripting attacks.
> If the POST request containing the autoscroll parameter is fuzzed to include something on the lines of "autoScroll=0%2C275);//--></script><IMG%20src="bla"%20onerror="alert(document.cookie)"><script>( ", one can see the JavaScript pop-up. This appears to be a vulnerability throughout the JSF apps.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
[jira] Issue Comment Edited: (TOMAHAWK-983) Cross-site scripting in
autoscroll parameter
Posted by "Manfred Geiler (JIRA)" <de...@myfaces.apache.org>.
[ https://issues.apache.org/jira/browse/TOMAHAWK-983?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12504163 ]
Manfred Geiler edited comment on TOMAHAWK-983 at 6/15/07 12:02 AM:
-------------------------------------------------------------------
Thanks rajat for submitting this issue.
Sorry for the delay. A priority "Critical" would have given this issue more attention...
was:
Thanks rajat for submitting this issue.
Sorry for the delay. A priority "Critical" would have given this one more attention...
> Cross-site scripting in autoscroll parameter
> --------------------------------------------
>
> Key: TOMAHAWK-983
> URL: https://issues.apache.org/jira/browse/TOMAHAWK-983
> Project: MyFaces Tomahawk
> Issue Type: Bug
> Components: ExtensionsFilter
> Affects Versions: 1.1.1, 1.1.2, 1.1.3, 1.1.5
> Environment: Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.7d
> Reporter: rajat
> Assignee: Manfred Geiler
> Priority: Critical
> Fix For: 1.1.6
>
>
> The autoscroll parameter inserted in the requests is vulnerable to cross-site scripting attacks.
> If the POST request containing the autoscroll parameter is fuzzed to include something on the lines of "autoScroll=0%2C275);//--></script><IMG%20src="bla"%20onerror="alert(document.cookie)"><script>( ", one can see the JavaScript pop-up. This appears to be a vulnerability throughout the JSF apps.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
[jira] Commented: (TOMAHAWK-983) Cross-site scripting in autoscroll
parameter
Posted by "Matthias Weßendorf (JIRA)" <de...@myfaces.apache.org>.
[ https://issues.apache.org/jira/browse/TOMAHAWK-983?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12506448 ]
Matthias Weßendorf commented on TOMAHAWK-983:
---------------------------------------------
check the "Subversion Commits" tab
> Cross-site scripting in autoscroll parameter
> --------------------------------------------
>
> Key: TOMAHAWK-983
> URL: https://issues.apache.org/jira/browse/TOMAHAWK-983
> Project: MyFaces Tomahawk
> Issue Type: Bug
> Components: ExtensionsFilter
> Affects Versions: 1.1.1, 1.1.2, 1.1.3, 1.1.5
> Environment: Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.7d
> Reporter: rajat
> Assignee: Manfred Geiler
> Priority: Critical
> Fix For: 1.1.6
>
>
> The autoscroll parameter inserted in the requests is vulnerable to cross-site scripting attacks.
> If the POST request containing the autoscroll parameter is fuzzed to include something on the lines of "autoScroll=0%2C275);//--></script><IMG%20src="bla"%20onerror="alert(document.cookie)"><script>( ", one can see the JavaScript pop-up. This appears to be a vulnerability throughout the JSF apps.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
[jira] Commented: (TOMAHAWK-983) Cross-site scripting in autoscroll
parameter
Posted by "Roland Schaal (JIRA)" <de...@myfaces.apache.org>.
[ https://issues.apache.org/jira/browse/TOMAHAWK-983?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12506444 ]
Roland Schaal commented on TOMAHAWK-983:
----------------------------------------
Can anybody tell me, what has been done to fix this issue?
I somehow don't see any difference comparing tomahawk-1.1.5.jar with tomahawk-1.1.6.jar?!
Thank you!
> Cross-site scripting in autoscroll parameter
> --------------------------------------------
>
> Key: TOMAHAWK-983
> URL: https://issues.apache.org/jira/browse/TOMAHAWK-983
> Project: MyFaces Tomahawk
> Issue Type: Bug
> Components: ExtensionsFilter
> Affects Versions: 1.1.1, 1.1.2, 1.1.3, 1.1.5
> Environment: Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.7d
> Reporter: rajat
> Assignee: Manfred Geiler
> Priority: Critical
> Fix For: 1.1.6
>
>
> The autoscroll parameter inserted in the requests is vulnerable to cross-site scripting attacks.
> If the POST request containing the autoscroll parameter is fuzzed to include something on the lines of "autoScroll=0%2C275);//--></script><IMG%20src="bla"%20onerror="alert(document.cookie)"><script>( ", one can see the JavaScript pop-up. This appears to be a vulnerability throughout the JSF apps.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
[jira] Resolved: (TOMAHAWK-983) Cross-site scripting in autoscroll
parameter
Posted by "Manfred Geiler (JIRA)" <de...@myfaces.apache.org>.
[ https://issues.apache.org/jira/browse/TOMAHAWK-983?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Manfred Geiler resolved TOMAHAWK-983.
-------------------------------------
Resolution: Fixed
> Cross-site scripting in autoscroll parameter
> --------------------------------------------
>
> Key: TOMAHAWK-983
> URL: https://issues.apache.org/jira/browse/TOMAHAWK-983
> Project: MyFaces Tomahawk
> Issue Type: Bug
> Components: ExtensionsFilter
> Affects Versions: 1.1.1, 1.1.2, 1.1.3, 1.1.5
> Environment: Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.7d
> Reporter: rajat
> Assignee: Manfred Geiler
> Priority: Critical
> Fix For: 1.1.6
>
>
> The autoscroll parameter inserted in the requests is vulnerable to cross-site scripting attacks.
> If the POST request containing the autoscroll parameter is fuzzed to include something on the lines of "autoScroll=0%2C275);//--></script><IMG%20src="bla"%20onerror="alert(document.cookie)"><script>( ", one can see the JavaScript pop-up. This appears to be a vulnerability throughout the JSF apps.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
[jira] Commented: (TOMAHAWK-983) Cross-site scripting in autoscroll
parameter
Posted by "Manfred Geiler (JIRA)" <de...@myfaces.apache.org>.
[ https://issues.apache.org/jira/browse/TOMAHAWK-983?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12506446 ]
Manfred Geiler commented on TOMAHAWK-983:
-----------------------------------------
The HtmlRendererUtils class is different!
> Cross-site scripting in autoscroll parameter
> --------------------------------------------
>
> Key: TOMAHAWK-983
> URL: https://issues.apache.org/jira/browse/TOMAHAWK-983
> Project: MyFaces Tomahawk
> Issue Type: Bug
> Components: ExtensionsFilter
> Affects Versions: 1.1.1, 1.1.2, 1.1.3, 1.1.5
> Environment: Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.7d
> Reporter: rajat
> Assignee: Manfred Geiler
> Priority: Critical
> Fix For: 1.1.6
>
>
> The autoscroll parameter inserted in the requests is vulnerable to cross-site scripting attacks.
> If the POST request containing the autoscroll parameter is fuzzed to include something on the lines of "autoScroll=0%2C275);//--></script><IMG%20src="bla"%20onerror="alert(document.cookie)"><script>( ", one can see the JavaScript pop-up. This appears to be a vulnerability throughout the JSF apps.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
[jira] Commented: (TOMAHAWK-983) Cross-site scripting in autoscroll
parameter
Posted by "Manfred Geiler (JIRA)" <de...@myfaces.apache.org>.
[ https://issues.apache.org/jira/browse/TOMAHAWK-983?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12504163 ]
Manfred Geiler commented on TOMAHAWK-983:
-----------------------------------------
Thanks rajat for submitting this issue.
Sorry for the delay. A priority "Critical" would have given this one more attention...
> Cross-site scripting in autoscroll parameter
> --------------------------------------------
>
> Key: TOMAHAWK-983
> URL: https://issues.apache.org/jira/browse/TOMAHAWK-983
> Project: MyFaces Tomahawk
> Issue Type: Bug
> Components: ExtensionsFilter
> Affects Versions: 1.1.1, 1.1.2, 1.1.3, 1.1.5
> Environment: Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.7d
> Reporter: rajat
> Assignee: Manfred Geiler
> Priority: Critical
> Fix For: 1.1.6
>
>
> The autoscroll parameter inserted in the requests is vulnerable to cross-site scripting attacks.
> If the POST request containing the autoscroll parameter is fuzzed to include something on the lines of "autoScroll=0%2C275);//--></script><IMG%20src="bla"%20onerror="alert(document.cookie)"><script>( ", one can see the JavaScript pop-up. This appears to be a vulnerability throughout the JSF apps.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.