https://issues.apache.org/bugzilla/show_bug.cgi?id=45652

           Summary: XSS patch for EL
           Product: Tomcat 6
           Version: unspecified
          Platform: All
        OS/Version: All
            Status: NEW
          Keywords: PatchAvailable
          Severity: major
          Priority: P2
         Component: Jasper
        AssignedTo: [EMAIL PROTECTED]
        ReportedBy: [EMAIL PROTECTED]


Created an attachment (id=22455)
 --> (https://issues.apache.org/bugzilla/attachment.cgi?id=22455)
Test JSP

Hi everyone,

There is an old post from Matt Raible regarding an XSS vulnerability present in
all tomcat installations by default:
http://raibledesigns.com/rd/entry/java_web_frameworks_and_xss

The JSP I have attached shows a quick-and-dirty test to inject arbitrary HTML
into your page using EL expressions like ${foobar}. I know that "<c:out>" can
be used as a workaround, but it is quite verbose and easy to miss.

As part of my job as a developer of Loom
(http://www.loom.extrema-sistemas.com/) I have prepared a patch for
Generator.java so XML content obtained from EL expressions can be configured to
be escaped defaulting to false (to keep current behavior, but maybe true would
be the safe bet here).

Regards
Rafa


-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to