[ 
https://issues.apache.org/struts/browse/STR-3191?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=46735#action_46735
 ] 

Vincent Danen commented on STR-3191:
------------------------------------

I've been looking at this issue for a while, and I noticed the patch, but I 
also noticed it hasn't been pushed into the 1.x source tree.  Is there a 
particular reason why it hasn't been put in yet?  We are thinking of rolling 
updates with the patch for older struts 1.3.x versions, but if there is 
something preventing this from getting into HEAD then we'd rather not start off 
with a faulty fix.

Any help here would be sincerely appreciated.

> Sufficently filter HTML tag attribute names and values
> ------------------------------------------------------
>
>                 Key: STR-3191
>                 URL: https://issues.apache.org/struts/browse/STR-3191
>             Project: Struts 1
>          Issue Type: Bug
>          Components: Tag Libraries
>    Affects Versions: 1.2.9, 1.3.10
>            Reporter: Paul Benedict
>            Assignee: Paul Benedict
>            Priority: Blocker
>             Fix For: 1.3.11, 1.4.0
>
>         Attachments: STR-3191-patch.txt
>
>
> Allows remote attackers to inject arbitrary web script or HTML via 
> unspecified vectors related to insufficient quoting of parameters. 
> * https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2025
> * http://support.novell.com/security/cve/CVE-2008-2025.html

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to