Am 09.11.2012 00:50, schrieb Massimo Manghi:
> Hi Jeff and Harald
> 
> On 11/08/2012 09:16 PM, Jeff Lawson wrote:
>> On Thu, Nov 8, 2012 at 7:58 AM, Harald Oehlmann
>> <harald.oehlm...@elmicron.de>  wrote:
>>> Am 07.11.2012 00:10, schrieb Jeff Lawson:
>>>> On Tue, Nov 6, 2012 at 3:30 AM, Harald Oehlmann
>>>> <harald.oehlm...@elmicron.de>  wrote:
>>>>> Am 06.11.2012 09:48, schrieb Jeff Lawson:
>>>>>> I have verified that it now seems fixed for textareas with your
>>>>>> change.  I will try to confirm with my colleague about his purported
>>>>>> failure with checkboxes and construct an example if needed.
>>>>>
>>>>> Thank you, Jeff.
>>>>>
>>>>> The reason for this change was to correctly interpret list and
>>>>> values to
>>>>> avoid a malfunction or crash, if the user enteres something, which is
>>>>> not a list.
>>>>>
>>>>
>>>> Here is another example that demonstrates the difference in checkbox
>>>> behavior... In form 1.0, there are several checkboxes selected by
>>>> default, but on form 2.0 none of them are.  Note that -value is not
>>>> specified for the checkboxes, but any "true" value was accepted as
>>>> signalled a checked state under form 1.0
>>>>
>>>>
> 
> I agree that we should preserve the former behavior (form 1.0) to keep
> form 2.0 compatible with existing code and also because it's rather
> intuitive and desirable to have default values of checkboxes (like for
> any other input element) set at the form level instead of setting each
> input element independently.

Thank you, Jeff and Massimo,
I propose to solve it in the following way:
- only for checkboxes (not for radiobutton, where it worked before too):
If there is a default value and no "-value" defined, only the attribute
"checked" is set, but not the value.

Why I think, it is a security hole if the default value is inserted in
the "value" property of the html code:
Imagine:
checkbox a
and the url:
localhost?a=arbitrary data
then, the arbitrary data is entered in the html code:
<type="checkbox value="arbitrary data">
An attacker may inject a kilobyte of vulnerable code in the html code.
If method "post" is used, nobody will see the code. A user must just
click (or must be redirected) to inject the code.

Thank you,
Harald

---------------------------------------------------------------------
To unsubscribe, e-mail: rivet-dev-unsubscr...@tcl.apache.org
For additional commands, e-mail: rivet-dev-h...@tcl.apache.org

Reply via email to