[ 
https://issues.apache.org/jira/browse/WW-3608?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Maurizio Cucchiara reassigned WW-3608:
--------------------------------------

    Assignee: Maurizio Cucchiara

> Java Template defaults to opening up a XSS vulnerability
> --------------------------------------------------------
>
>                 Key: WW-3608
>                 URL: https://issues.apache.org/jira/browse/WW-3608
>             Project: Struts 2
>          Issue Type: Bug
>          Components: Plugin - Java Templates
>            Reporter: Dustin Digmann
>            Assignee: Maurizio Cucchiara
>
> The following components do not escape input by default on submission: 
> FileHandler, HiddenHandler, PasswordHandler, ResetHandler, SelectHandler, 
> SubmitHandler, and TextFieldHandler.  This opens up an XSS vulnerability by 
> default.
> They currently do something like:
> .addIfExists("value", params.get("nameValue"), false)
> instead of:
> .addIfExists("value", params.get("nameValue"), true)
> I vote it defaults to escaping.  Having an attribute added to toggle it would 
> be nice too.

--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to