[
http://jira.magnolia-cms.com/browse/MGNLSTK-791?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Jan Haderka updated MGNLSTK-791:
--------------------------------
Assignee: (was: Philipp Bärfuss)
Fix Version/s: 1.4.8
2.0.5
Priority: Critical (was: Neutral)
> Cross Site Scripting Vulnerability (XSS) in pagination
> ------------------------------------------------------
>
> Key: MGNLSTK-791
> URL: http://jira.magnolia-cms.com/browse/MGNLSTK-791
> Project: Magnolia Standard Templating Kit
> Issue Type: Bug
> Components: paragraphs
> Affects Versions: 1.4.4
> Reporter: Frank Bosma
> Priority: Critical
> Fix For: 1.4.8, 2.0.5
>
>
> The pagination in the STK as used in, among others, the newsoverview and
> eventoverview is vulnerable to cross site scripting. The hrefs of page
> hyperlinks contain the original URL with an added currentPage parameter. The
> original URL can have malicious scripts syntax which will be executed when
> the page hyperlinks are rendered.
> An example can be found on the Magnolia demo site's newsoverview page if you
> define a paging for the newsoverview paragraph:
> http://demo.magnolia-cms.com/demo-project/news-and-events/news-overview.html?currentPage=2&xss="><script>alert('XSS');</script>
> A live example is on a website we made:
> http://www.wetenschap24.nl/nieuws/artikelen.html?currentPage=3&xss="><script>alert('XSS');</script>
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
http://jira.magnolia-cms.com/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
----------------------------------------------------------------
For list details, see: http://www.magnolia-cms.com/community/mailing-lists.html
Alternatively, use our forums: http://forum.magnolia-cms.com/
To unsubscribe, E-mail to: <[email protected]>
----------------------------------------------------------------