[ http://jira.magnolia.info/browse/MAGNOLIA-590?page=all ]

Boris Kraft reassigned MAGNOLIA-590:
------------------------------------

    Assign To: Philipp Bracher  (was: Boris Kraft)

> Cross Site Scripting Vulnerability (XSS) in Search template
> -----------------------------------------------------------
>
>          Key: MAGNOLIA-590
>          URL: http://jira.magnolia.info/browse/MAGNOLIA-590
>      Project: magnolia wcm
>         Type: Bug
>     Reporter: Oliver Lietz
>     Assignee: Philipp Bracher
>     Priority: Critical

>
>
> file: webapp/templates/jsp/samples/search.jsp
> User input/output is not escaped, attacker could inject (script) code into 
> page and steal cookie/login information.
> magnolia.info is also affected:
> http://www.magnolia.info/en/search.html?query=<script>alert("XSS");</script>
> This is a *very* simple XSS vulnerability  test.

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
   http://jira.magnolia.info/secure/Administrators.jspa
-
For more information on JIRA, see:
   http://www.atlassian.com/software/jira


----------------------------------------------------------------
for list details see
http://www.magnolia.info/en/magnolia/developer.html
----------------------------------------------------------------

Reply via email to