I opened a new JIRA issue for it: 
https://issues.apache.org/jira/browse/JS2-656, as well as committed a fix :)
The reported vulnerability is no longer possible.

Regards, Ate

David Sean Taylor wrote:
We're working on a fix, thanks

On Mar 2, 2007, at 12:31 AM, Santiago Gala wrote:

El mar, 27-02-2007 a las 15:23 +0100, Eric Nolte escribió:
Hi,

it seams that Jetspeed in it's default configuration is vulnerable to
cross site scriptings like this:
http://localhost:8080/jetspeed/portal/pages/default-page.psml/%22%3e%3cscript%3ealert(%27XSS%20test%27)%3c/script%3e

My question is how can i prevent this?
One possibility is to write a valve and filter the URL. Depending on
the pattern of the URL I can reject the request.

Do you have a better idea how to solve this or is there already a
common way for doing this?


Could you please report it as a JIRA issue? IMO this is a blocker if it
is still present in 2.1rc*

Regards
Santiago

Thanks in advance.

Regards,
 Eric

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



--David Sean Taylor
Bluesunrise Software
[EMAIL PROTECTED]
[office] +01 707 773-4646
[mobile] +01 707 529 9194



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to