You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@wicket.apache.org by "Martin Petricek (JIRA)" <ji...@apache.org> on 2014/12/04 15:25:12 UTC
[jira] [Created] (WICKET-5782) Missing escaping in
MultiFileUploadField.js - sort of XSS
Martin Petricek created WICKET-5782:
---------------------------------------
Summary: Missing escaping in MultiFileUploadField.js - sort of XSS
Key: WICKET-5782
URL: https://issues.apache.org/jira/browse/WICKET-5782
Project: Wicket
Issue Type: Bug
Affects Versions: 6.17.0
Reporter: Martin Petricek
When uploading files via org.apache.wicket.markup.html.form.upload.MultiFileUploadField component, names of uploaded files are added into a table.
Inside MultiFileUploadField.js is line that adds names of files:
{code}
contentsColumn.innerHTML = this.getOnlyFileNames(element);
{code}
This code is missing any escaping, so if you upload file named:
{code}
<code onmouseover=alert(1)>.doc
{code}
and hover on the name, you trigger sort of an XSS.
It is unlikely to be a real threat, as you can probably only attack yourself with this bug and it very uncommon to have files with "<" or ">" characters in their name, but "&" can be relatively common in names of files and "&" needs proper escaping too.
So before adding the filename to contentsColumn.innerHtml, it needs to be properly escaped.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)