You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@deltaspike.apache.org by "Mark Struberg (Jira)" <ji...@apache.org> on 2019/10/10 07:22:00 UTC

[jira] [Commented] (DELTASPIKE-1389) Sanitizing of dswid imperfect (XSS, security)

    [ https://issues.apache.org/jira/browse/DELTASPIKE-1389?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16948273#comment-16948273 ] 

Mark Struberg commented on DELTASPIKE-1389:
-------------------------------------------

Switching this to private for CVE reasons.


> Sanitizing of dswid imperfect (XSS, security)
> ---------------------------------------------
>
>                 Key: DELTASPIKE-1389
>                 URL: https://issues.apache.org/jira/browse/DELTASPIKE-1389
>             Project: DeltaSpike
>          Issue Type: Bug
>          Components: JSF-Module
>    Affects Versions: 1.9.1
>            Reporter: Matthias Walliczek
>            Assignee: Mark Struberg
>            Priority: Major
>              Labels: security
>
> Despide that it was improving in https://issues.apache.org/jira/browse/DELTASPIKE-1307, the sanitizing of the dswid parameter is still imperfect.
> PoC: request a page with "xzy.jsf?dswid=',danger,'" will render "danger" as variable into the javascript code.
> Solution: Instead of filtering "(", "<" and "&" as a black list attempt which is not recommended by the OWASP, only numeric characters and "-" should be allowed as white list approach.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)