XSS attack while launching Pop up
---------------------------------

                 Key: TRINIDAD-1798
                 URL: https://issues.apache.org/jira/browse/TRINIDAD-1798
             Project: MyFaces Trinidad
          Issue Type: Bug
    Affects Versions: 1.2.9-core
            Reporter: Virginie reverse
            Priority: Critical


hello,
I am using Tinidad 1.2.9, JSF 1.2 and tomcat 5.5.26.

I am launching a pop up with this command :

 <tr:commandLink id="idAddCurrencyDialog" 
text="#{msg.updateAttributes_add_currency}"   
action="dialog:addModifyAttribute" useWindow="true" partialSubmit="true" 
launchListener="#{updateAttributesController.launchAddCurrencyDialog}" 
returnListener="#{updateAttributesController.returnFromDialogAttribute}" 
windowHeight="500" windowWidth="500"/>          

Here is the command generated : 

https://xxx/meta/faces/__ADFv__?_afPfm=-543e4359&_t=fred&_vir=/common/pages/secure/common/dialog/addModifyAttribute.jspx&loc=en&_minWidth=500&_minHeight=500&_rtrnId=1
The problem is that it's allowing cross site script attack , you can insert 
javascript in the : 
_minWidth, _minHeight or_rtrnId

For  exple :
https://xxx/meta/faces/__ADFv__?_afPfm=-543e4359&_t=fred&_vir=/common/pages/secure/common/dialog/addModifyAttribute.jspx&loc=en&_minWidth=500&_minHeight=500});alert(document.cookie);//&_rtrnId=1

I tried to upgrade to 1.2.13, but there was still the problem.

Do you know a work around or is it possible to fix this security breach ?

thxs

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to