click-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Bob Schellink (JIRA)" <j...@apache.org>
Subject [jira] Updated: (CLK-726) bypass_validation opens security hole
Date Sat, 13 Nov 2010 13:42:14 GMT

     [ https://issues.apache.org/jira/browse/CLK-726?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Bob Schellink updated CLK-726:
------------------------------

    Affects Version/s: 2.2.0
        Fix Version/s: 2.3.0-M1
             Assignee: Bob Schellink

> bypass_validation opens security hole
> -------------------------------------
>
>                 Key: CLK-726
>                 URL: https://issues.apache.org/jira/browse/CLK-726
>             Project: Click
>          Issue Type: Bug
>          Components: core
>    Affects Versions: 2.2.0
>            Reporter: Moritz Kammerer
>            Assignee: Bob Schellink
>             Fix For: 2.3.0-M1
>
>
> An attacker can easily bypass form validation by setting the hidden field "bypass_validation"
to true. A call to form.isValid() returns true though the validators have not been run. If
the software relies on the form validators, its easy to get "evil" data in the application.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


Mime
View raw message