[ http://issues.apache.org/jira/browse/GERONIMO-1540?page=all ]
Kevan Miller reassigned GERONIMO-1540:
--------------------------------------
Assign To: Kevan Miller
> Fix security vulnerability in jsp-examples
> ------------------------------------------
>
> Key: GERONIMO-1540
> URL: http://issues.apache.org/jira/browse/GERONIMO-1540
> Project: Geronimo
> Type: Bug
> Components: sample apps
> Versions: 1.1, 1.0.1
> Reporter: Dave Colasurdo
> Assignee: Kevan Miller
> Attachments: geronimo-jsp-examples-tomcat-5.5.15-plus.war, jsp-examples.patch
>
> Oliver Karow has reported a cross-site scripting vulnerability in the Tomcat
> jsp-examples that are included in Geronimo. It fails on both Jetty and
> Tomcat.
> This can be reproduced with the following urls:
> http://localhost:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert('Gotcha')</script>
> http://localhost:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert(document.cookie)</script>
> This JIRA does not address a related problem in the admin console. That
> problem is addressed in GERONIMO-1474.
>
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
http://issues.apache.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see:
http://www.atlassian.com/software/jira