You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@deltaspike.apache.org by "Mark Struberg (Jira)" <ji...@apache.org> on 2019/10/10 07:22:00 UTC
[jira] [Commented] (DELTASPIKE-1389) Sanitizing of dswid imperfect
(XSS, security)
[ https://issues.apache.org/jira/browse/DELTASPIKE-1389?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16948273#comment-16948273 ]
Mark Struberg commented on DELTASPIKE-1389:
-------------------------------------------
Switching this to private for CVE reasons.
> Sanitizing of dswid imperfect (XSS, security)
> ---------------------------------------------
>
> Key: DELTASPIKE-1389
> URL: https://issues.apache.org/jira/browse/DELTASPIKE-1389
> Project: DeltaSpike
> Issue Type: Bug
> Components: JSF-Module
> Affects Versions: 1.9.1
> Reporter: Matthias Walliczek
> Assignee: Mark Struberg
> Priority: Major
> Labels: security
>
> Despide that it was improving in https://issues.apache.org/jira/browse/DELTASPIKE-1307, the sanitizing of the dswid parameter is still imperfect.
> PoC: request a page with "xzy.jsf?dswid=',danger,'" will render "danger" as variable into the javascript code.
> Solution: Instead of filtering "(", "<" and "&" as a black list attempt which is not recommended by the OWASP, only numeric characters and "-" should be allowed as white list approach.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)