You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@wicket.apache.org by "Martin Grigorov (JIRA)" <ji...@apache.org> on 2014/12/04 17:19:13 UTC
[jira] [Resolved] (WICKET-5782) Missing escaping in
MultiFileUploadField.js - sort of XSS
[ https://issues.apache.org/jira/browse/WICKET-5782?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Martin Grigorov resolved WICKET-5782.
-------------------------------------
Resolution: Fixed
Fix Version/s: 6.19.0
7.0.0-M5
Assignee: Martin Grigorov
> Missing escaping in MultiFileUploadField.js - sort of XSS
> ---------------------------------------------------------
>
> Key: WICKET-5782
> URL: https://issues.apache.org/jira/browse/WICKET-5782
> Project: Wicket
> Issue Type: Bug
> Affects Versions: 6.17.0
> Reporter: Martin Petricek
> Assignee: Martin Grigorov
> Fix For: 7.0.0-M5, 6.19.0
>
>
> When uploading files via org.apache.wicket.markup.html.form.upload.MultiFileUploadField component, names of uploaded files are added into a table.
> Inside MultiFileUploadField.js is line that adds names of files:
> {code}
> contentsColumn.innerHTML = this.getOnlyFileNames(element);
> {code}
> This code is missing any escaping, so if you upload file named:
> {code}
> <code onmouseover=alert(1)>.doc
> {code}
> and hover on the name, you trigger sort of an XSS.
> It is unlikely to be a real threat, as you can probably only attack yourself with this bug and it very uncommon to have files with "<" or ">" characters in their name, but "&" can be relatively common in names of files and "&" needs proper escaping too.
> So before adding the filename to contentsColumn.innerHtml, it needs to be properly escaped.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)