[ 
https://issues.apache.org/jira/browse/TOMAHAWK-1391?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leonardo Uribe resolved TOMAHAWK-1391.
--------------------------------------

       Resolution: Fixed
    Fix Version/s: 1.1.9-SNAPSHOT
         Assignee: Leonardo Uribe

Omit this string from response does not harm, so I just remove it as suggested.

> Inserting <!-- MYFACES JAVASCRIPT --> into HTML output is potential security 
> problem
> ------------------------------------------------------------------------------------
>
>                 Key: TOMAHAWK-1391
>                 URL: https://issues.apache.org/jira/browse/TOMAHAWK-1391
>             Project: MyFaces Tomahawk
>          Issue Type: Improvement
>          Components: ExtensionsFilter
>    Affects Versions: 1.1.8
>            Reporter: Kennard Consulting
>            Assignee: Leonardo Uribe
>            Priority: Minor
>             Fix For: 1.1.9-SNAPSHOT
>
>   Original Estimate: 0.17h
>  Remaining Estimate: 0.17h
>
> A recommended practice to security 'hardening' a Web site is to divulge as 
> little architectual information as possible. For example, we suppress the 
> X-Server HTTP header so you don't know what server we are using. We map 
> '*.jsf' to something else so you can't tell we're using JSF. 
> However, one giveaway is that in 
> org.apache.myfaces.renderkit.html.util.ExtensionsPhaseListener.java, method 
> getCodeBeforeBodyEnd(), around line 111, there is the line:
>    return "<!-- MYFACES JAVASCRIPT -->\n"+writerWrapper.toString()+"\n";
> This always outputs 'MYFACES' into the HTML whenever the 
> ExtensionsPhaseListener is used (even if there is no actual JavaScript being 
> output). I would like to see this line change to simply...
>    return writerWrapper.toString();
> Which would not give away we are using JSF.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to