[ 
https://issues.apache.org/jira/browse/WW-5623?focusedWorklogId=1015084&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-1015084
 ]

ASF GitHub Bot logged work on WW-5623:
--------------------------------------

                Author: ASF GitHub Bot
            Created on: 13/Apr/26 08:51
            Start Date: 13/Apr/26 08:51
    Worklog Time Spent: 10m 
      Work Description: tranquac commented on PR #1653:
URL: https://github.com/apache/struts/pull/1653#issuecomment-4235088125

   If there are any further issues that need correction or addition, let me 
know so I can improve it. Thanks @lukaszlenart and reviewers!




Issue Time Tracking
-------------------

    Worklog Id:     (was: 1015084)
    Time Spent: 40m  (was: 0.5h)

> XSS in PostbackResult.doExecute()
> ---------------------------------
>
>                 Key: WW-5623
>                 URL: https://issues.apache.org/jira/browse/WW-5623
>             Project: Struts 2
>          Issue Type: Bug
>          Components: Core
>    Affects Versions: 7.1.1
>            Reporter: Tran Quac
>            Priority: Major
>             Fix For: 7.2.0
>
>          Time Spent: 40m
>  Remaining Estimate: 0h
>
> h2. Summary
> PostbackResult.doExecute() at line 107 embeds finalLocation into a form 
> action attribute via raw string concatenation without HTML encoding. The 
> response Content-Type is text/html (line 103). A double-quote character in 
> the location breaks out of the attribute, enabling reflected XSS.
> This is an encoding inconsistency: form field names and values at lines 
> 218-219 ARE properly URL-encoded via URLEncoder.encode(), but the form action 
> attribute was not encoded at all.
> h2. Changes
>  * {*}PostbackResult.java{*}: Add encodeHtml() method to escape &, ", <, > in 
> finalLocation before embedding in the HTML form tag. Consistent with the 
> existing encoding approach for form field values.
> h2. Impact
> When a developer uses PostbackResult with an OGNL expression referencing a 
> user-controllable property (a documented framework feature for dynamic 
> routing), an attacker can inject arbitrary HTML attributes and elements via 
> the form action attribute.
> h2. Refer
> [https://github.com/apache/struts/pull/1653]
> [https://github.com/apache/struts/pull/1653/changes/1b2242487179f38009d118707b8e70ab396a3d27]



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to