It looks like that code comes from dev/core/src/com/google/gwt/core/ext/linker/impl/computeScriptBase.js or computeScriptBaseOld.js.
On Thu, Nov 8, 2012 at 10:37 PM, Anuradha bhat <[email protected]>wrote: > Hi , > We have developed a gwt application. We foundDOM based cross site > scripting issue in our .nocahe.js file. Here is the part of the code > mentioned in .js file which is vulnerable. Can any body help me in finding > , which type of java code will generate this code? Is there any way to do > reverse engineering > r = h(l.location.href) > function h(a) { > return d >= 0 ? a.substring(0, d + 1) : M > r = h(l.location.href) > if (y()) { > document.write(lc + r + uc) > > -- > You received this message because you are subscribed to the Google Groups > "Google Web Toolkit" group. > To view this discussion on the web visit > https://groups.google.com/d/msg/google-web-toolkit/-/CX2-nuHcMr0J. > To post to this group, send email to [email protected]. > To unsubscribe from this group, send email to > [email protected]. > For more options, visit this group at > http://groups.google.com/group/google-web-toolkit?hl=en. > -- You received this message because you are subscribed to the Google Groups "Google Web Toolkit" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/google-web-toolkit?hl=en.
