2008/1/13, Jeromy Evans <[EMAIL PROTECTED]>:
> I don't think this is a critical problem sheerly because the high
> prevalence of such vulnerabilities means some of the responsibility
> falls on the developer to not trust user-entered data..

This is not the case: I think it is a bug, since the url in <s:url>
should be *parsed* before, extracting the eventual querystring and its
parameters.
It is a bug, since ganfab (sorry I cannot read your name :-) ) tried
to use the <s:param> and it works.
I don't know how <c:url> of JSTL works, but I firmly suppose that it
parses the URL.

Antonio

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to