You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@struts.apache.org by "Paul Benedict (JIRA)" <ji...@apache.org> on 2009/07/27 05:20:59 UTC

[jira] Updated: (STR-3191) Sufficently filter HTML tag attribute names and values

     [ https://issues.apache.org/struts/browse/STR-3191?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Paul Benedict updated STR-3191:
-------------------------------

    Description: 
Allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to insufficient quoting of parameters. 

* https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2025
* http://support.novell.com/security/cve/CVE-2008-2025.html

  was:
Allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "insufficient quoting of parameters. 

* https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2025
* http://support.novell.com/security/cve/CVE-2008-2025.html

        Summary: Sufficently filter HTML tag attribute names and values  (was: Filter HTML attribute values)

> Sufficently filter HTML tag attribute names and values
> ------------------------------------------------------
>
>                 Key: STR-3191
>                 URL: https://issues.apache.org/struts/browse/STR-3191
>             Project: Struts 1
>          Issue Type: Bug
>          Components: Tag Libraries
>    Affects Versions: 1.2.9, 1.3.10
>            Reporter: Paul Benedict
>            Assignee: Paul Benedict
>            Priority: Blocker
>             Fix For: 1.3.11, 1.4.0
>
>
> Allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to insufficient quoting of parameters. 
> * https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2025
> * http://support.novell.com/security/cve/CVE-2008-2025.html

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.