[ 
https://issues.apache.org/jira/browse/CLK-762?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Bob Schellink resolved CLK-762.
-------------------------------

    Resolution: Fixed
      Assignee: Bob Schellink

Thanks, fix checked in

> Cross Site Scripting Issue in ErrorPage
> ---------------------------------------
>
>                 Key: CLK-762
>                 URL: https://issues.apache.org/jira/browse/CLK-762
>             Project: Click
>          Issue Type: Bug
>         Environment: N/A
>            Reporter: Tsuyoshi Yamamoto
>            Assignee: Bob Schellink
>   Original Estimate: 1h
>  Remaining Estimate: 1h
>
> Click 2.3.0 line 289 in ErrorReport.java should be HTMLescaped, because 
> QueryString may include the malicious HTML / JavaScript which causes Cross 
> Site Scripting on ErrorPage.
> For example, Click causes java.lang.NumberFormatException when the query 
> string 'id' expects a value in integer but string is passed. And if the 
> string is '241<script>alert(20908)</script>' then we can see the popup on 
> ErrorPage that results the vulnerability of the webapp.

--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to