You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@roller.apache.org by "Anil Gangolli (JIRA)" <ji...@apache.org> on 2008/12/25 23:27:20 UTC

[jira] Assigned: (ROL-1766) Cross-site scripting vulnerability in Roller search term treatment

     [ https://issues.apache.org/roller/browse/ROL-1766?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Anil Gangolli reassigned ROL-1766:
----------------------------------

    Assignee: Anil Gangolli  (was: Roller Unassigned)

> Cross-site scripting vulnerability in Roller search term treatment
> ------------------------------------------------------------------
>
>                 Key: ROL-1766
>                 URL: https://issues.apache.org/roller/browse/ROL-1766
>             Project: Roller
>          Issue Type: Bug
>          Components: Search
>    Affects Versions: 2.3, 3.0, 3.1, 4.0
>         Environment: any
>            Reporter: Anil Gangolli
>            Assignee: Anil Gangolli
>         Attachments: ROL-1766-weblog-vm.patch
>
>
> The search term submitted to Roller as the value of the "q" parameter on search requests (/search?q=query+terms) is echoed back in the default search form without escaping HTML tags.
> This can be converted to a cross-site scripting attack.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.