XSS Vulnerability in jpfScopeID
-------------------------------

                 Key: BEEHIVE-1197
                 URL: https://issues.apache.org/jira/browse/BEEHIVE-1197
             Project: Beehive
          Issue Type: Bug
          Components: NetUI
    Affects Versions: 1.0.2, 1.0.1, 1.0, v1m1, V1Beta, V1Alpha, V.Next
         Environment: Any
            Reporter: Scott L'Hommedieu


When a processing a request to a url such as  
http://xxx/xx.jfp?jpfScopeID=";<script> , resulting links in response will 
include the scope id as is.  Such as ?jpfScopeID="<>?.

Since jpfScopeID appending is not controlled by end user code, this behavior 
possibly cause XSS vulnerability. 

For example, if giving url like
 .....submit.do?jpfScopeID=%22%3E%3Cscript%3Ealert('gotcha')%3C/script%3E

The browser will evaluate and run the script.

This affects several tags and scoping bits.

Fix is to html encode the jpfScopeID in ScopedServletUtils and call that from 
tags and such.

I can attach a patch shortly.





-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to