[
https://issues.apache.org/jira/browse/CXF-6216?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14288234#comment-14288234
]
Sergey Beryozkin edited comment on CXF-6216 at 1/22/15 9:14 PM:
----------------------------------------------------------------
Can you explain how the CXF code above can be exploited. The fact that it can
be exploited in theory is not a good enough reason for keeping this JIRA open.
The code you quoted uses a property calculated from a request URI and the local
relative endpoint address. The class of the span attribute is value. No user
provided data is included. Where is the space for the attack ? Can you be
concrete please ?
Thanks
was (Author: sergey_beryozkin):
Can you explain how the CXF code above can be exploited. The fact that it can
be expploied in principle is not a good enough reason for keeping this JIRA
open. The code you quoted uses a property calculated from a request URI and the
local relative endpoint address. The class of the span attribute is value. No
user provided data is included. Where is the space for the attack ? Can you be
concrete please ?
Thanks
> No output sanitizing in FormattedServiceListWriter
> ---------------------------------------------------
>
> Key: CXF-6216
> URL: https://issues.apache.org/jira/browse/CXF-6216
> Project: CXF
> Issue Type: Bug
> Components: Core
> Affects Versions: 3.0.1
> Reporter: Donald Kwakkel
>
> No output sanitizing is done, which makes the code vulnerable for injection.
> I do not have a specific use case, but it is good habit to do. Maybe you can
> use the OWASP Sanitizer:
> https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer_Project
> One example from the file:
> writer.write("<span class=\"field\">Endpoint address:</span> " +
> "<span class=\"value\">"
> + absoluteURL + "</span>");
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)