You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@myfaces.apache.org by "Ross Clewley (JIRA)" <de...@myfaces.apache.org> on 2014/05/20 19:56:38 UTC

[jira] [Created] (PORTLETBRIDGE-235) Security Vulnerability exposed via viewId related request parameters.

Ross Clewley created PORTLETBRIDGE-235:
------------------------------------------

             Summary: Security Vulnerability exposed via viewId related request parameters. 
                 Key: PORTLETBRIDGE-235
                 URL: https://issues.apache.org/jira/browse/PORTLETBRIDGE-235
             Project: MyFaces Portlet Bridge
          Issue Type: Bug
            Reporter: Ross Clewley
            Assignee: Michael Freedman
            Priority: Critical


The Portlet bridge allows the request parameters _jsfBridgeViewId,  _jsfBridgeViewPath, __jpfbJSFTARGET and __jpfbJSFResTARGET to influence the viewId that is passed across a trust boundary to the JSF implementation. If the viewId is an absolute URL, that can result in that URL being retrieved and the document being executed as a facelet view definition file, allowing arbitrary java code to be executed. 



--
This message was sent by Atlassian JIRA
(v6.2#6252)