You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@cocoon.apache.org by "Antonio Gallardo (JIRA)" <ji...@apache.org> on 2007/07/20 19:01:06 UTC

[jira] Reopened: (COCOON-2073) Upgrade to dojo 0.4.3 (security fixes!)

     [ https://issues.apache.org/jira/browse/COCOON-2073?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Antonio Gallardo reopened COCOON-2073:
--------------------------------------


At least in 2.1.11-dev this seems to not being fixed (for Linux?). Add the next line to a any page with dojo and it sends back 0.4.1:

dojo.debug("The current version of dojo is: ", dojo.version.toString());


> Upgrade to dojo 0.4.3 (security fixes!)
> ---------------------------------------
>
>                 Key: COCOON-2073
>                 URL: https://issues.apache.org/jira/browse/COCOON-2073
>             Project: Cocoon
>          Issue Type: Improvement
>          Components: Blocks: Ajax
>    Affects Versions: 2.1.11-dev (Current SVN), 2.2-dev (Current SVN)
>            Reporter: Alexander Klimetschek
>            Assignee: Grzegorz Kossakowski
>
> Current ajax block includes dojo 0.4.1. The current release of dojo is 0.4.3 - in 0.4.2 minor improvements were made but 0.4.3 includes security fixes for cross-site scripting attacks and the guys at dojo strongly recommend upgrading. As far as I can see, there should be no compatibility issues with Cocoon's dojo widgets. 
> http://dojotoolkit.org/releaseNotes/0.4.3

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.