You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tapestry.apache.org by "Howard M. Lewis Ship (Closed) (JIRA)" <ji...@apache.org> on 2011/10/19 18:57:10 UTC
[jira] [Closed] (TAP5-1442) XSS vulnerability in calendar component
[ https://issues.apache.org/jira/browse/TAP5-1442?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Howard M. Lewis Ship closed TAP5-1442.
--------------------------------------
Resolution: Fixed
Fix Version/s: 5.3
Assignee: Howard M. Lewis Ship
> XSS vulnerability in calendar component
> ---------------------------------------
>
> Key: TAP5-1442
> URL: https://issues.apache.org/jira/browse/TAP5-1442
> Project: Tapestry 5
> Issue Type: Bug
> Components: tapestry-core
> Affects Versions: 5.2.4
> Reporter: Emmanuel DEMEY
> Assignee: Howard M. Lewis Ship
> Fix For: 5.3
>
> Attachments: datefield_5_2_4_xss_fix.js, datefield_js.patch
>
>
> All the XSS Vulnerabiliy (described here : https://issues.apache.org/jira/browse/TAP5-1057) is not solved.
> When we use a Software like Paros, we can change the value of Ajax Request parameters.
> We can run javascript code.
> I did a patch this morning. I just added the escapeHTML function in both of the errorHandler methods.
> Emmanuel
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira