It looks like that code comes
from dev/core/src/com/google/gwt/core/ext/linker/impl/computeScriptBase.js
or computeScriptBaseOld.js.


On Thu, Nov 8, 2012 at 10:37 PM, Anuradha bhat <[email protected]>wrote:

> Hi ,
>    We have developed a gwt application. We foundDOM based cross site
> scripting issue in our .nocahe.js file. Here is the part of the code
> mentioned in .js file which is vulnerable. Can any body help me in finding
> , which type of java code will generate this code? Is there any way to do
> reverse engineering
>  r = h(l.location.href)
>  function h(a) {
>  return d >= 0 ? a.substring(0, d + 1) : M
>  r = h(l.location.href)
>  if (y()) {
>  document.write(lc + r + uc)
>
> --
> You received this message because you are subscribed to the Google Groups
> "Google Web Toolkit" group.
> To view this discussion on the web visit
> https://groups.google.com/d/msg/google-web-toolkit/-/CX2-nuHcMr0J.
> To post to this group, send email to [email protected].
> To unsubscribe from this group, send email to
> [email protected].
> For more options, visit this group at
> http://groups.google.com/group/google-web-toolkit?hl=en.
>

-- 
You received this message because you are subscribed to the Google Groups 
"Google Web Toolkit" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/google-web-toolkit?hl=en.

Reply via email to