[ 
https://issues.apache.org/jira/browse/JENA-1123?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Andy Seaborne updated JENA-1123:
--------------------------------
    Description: 
In fuseki web interface, dataset.html page -> tab "query"
it's possible to write query like:

{noformat}
SELECT 
      ("<b>hello</b>" AS ?Y)
      ("<script>alert(document.domain)</script>" AS ?X) 
WHERE { }
{noformat}

that show a pop-up with hostname.
Probably the problem is with the YASQE dependency.

  was:
In fuseki web interface, dataset.html page -> tab "query"
it's possible to write query like:

{noformat}
SELECT ("<script>alert(document.domain)</script>" AS ?X) WHERE { }
{noformat}

that show a pop-up with hostname.
Probably the problem is with the YASQE dependency.


> Cross Site Scripting (XSS) vulnerability on Fuseki 2.3.1
> --------------------------------------------------------
>
>                 Key: JENA-1123
>                 URL: https://issues.apache.org/jira/browse/JENA-1123
>             Project: Apache Jena
>          Issue Type: Bug
>          Components: Fuseki
>    Affects Versions: Fuseki 2.3.1
>            Reporter: Massimiliano Ricci
>              Labels: security, xss
>
> In fuseki web interface, dataset.html page -> tab "query"
> it's possible to write query like:
> {noformat}
> SELECT 
>       ("<b>hello</b>" AS ?Y)
>       ("<script>alert(document.domain)</script>" AS ?X) 
> WHERE { }
> {noformat}
> that show a pop-up with hostname.
> Probably the problem is with the YASQE dependency.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to