GitHub user bond- opened a pull request:

    https://github.com/apache/sling/pull/12

    SLING-3443: Parameter based redirection vulnerability in 
FormAuthenticationHandler

    *FormAuthenticationHandler* didn't url encode the 
parameter(*Authenticator.LOGIN_RESOURCE*) before redirection. This leads the 
attacker to use this parameter to redirect to a different domain. This may also 
help in phishing attacks. 
    
    This was initially spotted in one of our applications which use 
org.apache.sling:org.apache.sling.auth.form:1.0.2
    
    This pull request fixes the vulnerability.

You can merge this pull request into a Git repository by running:

    $ git pull https://github.com/bond-/sling sling-3443

Alternatively you can review and apply these changes as the patch at:

    https://github.com/apache/sling/pull/12.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

    This closes #12
    
----
commit d1531735762e7423404f1e304dfc4c483f9556de
Author: Raviteja Lokineni <[email protected]>
Date:   2014-03-08T12:24:52Z

    SLING-3443: Parameter based redirection vulnerability in 
FormAuthenticationHandler

----


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at [email protected] or file a JIRA ticket
with INFRA.
---

Reply via email to