Return-Path: Delivered-To: apmail-click-dev-archive@www.apache.org Received: (qmail 40499 invoked from network); 13 Nov 2010 13:42:12 -0000 Received: from unknown (HELO mail.apache.org) (140.211.11.3) by 140.211.11.9 with SMTP; 13 Nov 2010 13:42:12 -0000 Received: (qmail 12082 invoked by uid 500); 13 Nov 2010 13:42:43 -0000 Delivered-To: apmail-click-dev-archive@click.apache.org Received: (qmail 12023 invoked by uid 500); 13 Nov 2010 13:42:43 -0000 Mailing-List: contact dev-help@click.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@click.apache.org Delivered-To: mailing list dev@click.apache.org Received: (qmail 12016 invoked by uid 99); 13 Nov 2010 13:42:42 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 13 Nov 2010 13:42:42 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.22] (HELO thor.apache.org) (140.211.11.22) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 13 Nov 2010 13:42:35 +0000 Received: from thor (localhost [127.0.0.1]) by thor.apache.org (8.13.8+Sun/8.13.8) with ESMTP id oADDgEjs027859 for ; Sat, 13 Nov 2010 13:42:14 GMT Message-ID: <18268303.60351289655734123.JavaMail.jira@thor> Date: Sat, 13 Nov 2010 08:42:14 -0500 (EST) From: "Bob Schellink (JIRA)" To: dev@click.apache.org Subject: [jira] Updated: (CLK-726) bypass_validation opens security hole In-Reply-To: <28711435.227211288823364458.JavaMail.jira@thor> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/CLK-726?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Bob Schellink updated CLK-726: ------------------------------ Affects Version/s: 2.2.0 Fix Version/s: 2.3.0-M1 Assignee: Bob Schellink > bypass_validation opens security hole > ------------------------------------- > > Key: CLK-726 > URL: https://issues.apache.org/jira/browse/CLK-726 > Project: Click > Issue Type: Bug > Components: core > Affects Versions: 2.2.0 > Reporter: Moritz Kammerer > Assignee: Bob Schellink > Fix For: 2.3.0-M1 > > > An attacker can easily bypass form validation by setting the hidden field "bypass_validation" to true. A call to form.isValid() returns true though the validators have not been run. If the software relies on the form validators, its easy to get "evil" data in the application. -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.