[ 
https://issues.apache.org/roller/browse/ROL-1766?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Anil Gangolli updated ROL-1766:
-------------------------------

    Attachment: ROL-1766-weblog-vm.patch


Patch that can be applied to weblog.vm to workaround address this issue.  This 
patch is NOT needed if running build of Roller trunk after revision 668737, 
which fixes this issue in Java code without needing to modify the weblog.vm 
macros.
 

> Cross-site scripting vulnerability in Roller search term treatment
> ------------------------------------------------------------------
>
>                 Key: ROL-1766
>                 URL: https://issues.apache.org/roller/browse/ROL-1766
>             Project: Roller
>          Issue Type: Bug
>          Components: Search
>    Affects Versions: 2.3, 3.0, 3.1, 4.0
>         Environment: any
>            Reporter: Anil Gangolli
>            Assignee: Roller Unassigned
>         Attachments: ROL-1766-weblog-vm.patch
>
>
> The search term submitted to Roller as the value of the "q" parameter on 
> search requests (/search?q=query+terms) is echoed back in the default search 
> form without escaping HTML tags.
> This can be converted to a cross-site scripting attack.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to