[ 
https://issues.apache.org/jira/browse/DELTASPIKE-963?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14638440#comment-14638440
 ] 

Ortwin Escher commented on DELTASPIKE-963:
------------------------------------------

The fix works, thank you!

> Header injection due to unescaped key in JsfUtils
> -------------------------------------------------
>
>                 Key: DELTASPIKE-963
>                 URL: https://issues.apache.org/jira/browse/DELTASPIKE-963
>             Project: DeltaSpike
>          Issue Type: Bug
>    Affects Versions: 1.4.1
>            Reporter: Ortwin Escher
>            Assignee: Thomas Andraschko
>             Fix For: 1.4.3
>
>
> The JsfUtils used in DeltaSpike URLEncode the values but not the keys. This 
> allows header injection (see 
> https://www.owasp.org/index.php/HTTP_Response_Splitting for more info on this 
> attack type). As an example if I open a page without window ID and thus have 
> a redirect by DefaultClientWindow.getOrCreateWindowId() in it:
> /somepage.xhtml?%0aSet-Cookie:%20newcookie%3Dinjectme%0a
> will cause the key side to be an unescaped part of the redirect URL and thus 
> cause the cookie to be set. the encodeValues parameter should also cause the 
> keys to be encoded as well.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to