You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@myfaces.apache.org by "Ross Clewley (JIRA)" <de...@myfaces.apache.org> on 2014/05/20 19:56:38 UTC
[jira] [Created] (PORTLETBRIDGE-235) Security Vulnerability exposed
via viewId related request parameters.
Ross Clewley created PORTLETBRIDGE-235:
------------------------------------------
Summary: Security Vulnerability exposed via viewId related request parameters.
Key: PORTLETBRIDGE-235
URL: https://issues.apache.org/jira/browse/PORTLETBRIDGE-235
Project: MyFaces Portlet Bridge
Issue Type: Bug
Reporter: Ross Clewley
Assignee: Michael Freedman
Priority: Critical
The Portlet bridge allows the request parameters _jsfBridgeViewId, _jsfBridgeViewPath, __jpfbJSFTARGET and __jpfbJSFResTARGET to influence the viewId that is passed across a trust boundary to the JSF implementation. If the viewId is an absolute URL, that can result in that URL being retrieved and the document being executed as a facelet view definition file, allowing arbitrary java code to be executed.
--
This message was sent by Atlassian JIRA
(v6.2#6252)