cxf-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Sergey Beryozkin (JIRA)" <>
Subject [jira] [Commented] (CXF-6216) No output sanitizing in FormattedServiceListWriter
Date Thu, 22 Jan 2015 21:14:35 GMT


Sergey Beryozkin commented on CXF-6216:

Can you explain how the CXF code above can be exploited. The fact that it can be expploied
in principle is not a good enough reason for keeping this JIRA open. The code you quoted uses
a property calculated from a request URI and the local relative endpoint address. The class
of the span attribute is value. No user provided data is included. Where is the space for
the attack ? Can you be concrete please ?

> No output sanitizing in FormattedServiceListWriter 
> ---------------------------------------------------
>                 Key: CXF-6216
>                 URL:
>             Project: CXF
>          Issue Type: Bug
>          Components: Core
>    Affects Versions: 3.0.1
>            Reporter: Donald Kwakkel
> No output sanitizing is done, which makes the code vulnerable for injection. I do not
have a specific use case, but it is good habit to do. Maybe you can use the OWASP Sanitizer:
> One example from the file: 
>         writer.write("<span class=\"field\">Endpoint address:</span> " +
"<span class=\"value\">"
>                      + absoluteURL + "</span>");

This message was sent by Atlassian JIRA

View raw message