geronimo-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Kevan Miller (JIRA)" <...@geronimo.apache.org>
Subject [jira] Resolved: (GERONIMO-1540) Fix security vulnerability in jsp-examples
Date Sat, 28 Jan 2006 17:02:35 GMT
     [ http://issues.apache.org/jira/browse/GERONIMO-1540?page=all ]
     
Kevan Miller resolved GERONIMO-1540:
------------------------------------

    Fix Version: 1.0.1
                 1.1
     Resolution: Fixed

Thanks to Dave for pulling this together.

New samples placed in /www/cvs.apache.org/repository/geronimo-samples/wars/

branches/1.0:
Sending        1.0/configs/jsp-examples-jetty/project.properties
Sending        1.0/configs/jsp-examples-jetty/project.xml
Sending        1.0/configs/jsp-examples-tomcat/project.properties
Sending        1.0/configs/jsp-examples-tomcat/project.xml
Sending        1.0/configs/servlets-examples-jetty/project.properties
Sending        1.0/configs/servlets-examples-jetty/project.xml
Sending        1.0/configs/servlets-examples-tomcat/project.properties
Sending        1.0/configs/servlets-examples-tomcat/project.xml
Sending        1.0/etc/project.properties
Transmitting file data .........
Committed revision 373179.

trunk:
Sending        trunk/configs/jsp-examples-jetty/project.properties
Sending        trunk/configs/jsp-examples-jetty/project.xml
Sending        trunk/configs/jsp-examples-tomcat/project.properties
Sending        trunk/configs/jsp-examples-tomcat/project.xml
Sending        trunk/configs/servlets-examples-jetty/project.properties
Sending        trunk/configs/servlets-examples-jetty/project.xml
Sending        trunk/configs/servlets-examples-tomcat/project.properties
Sending        trunk/configs/servlets-examples-tomcat/project.xml
Sending        trunk/etc/project.properties
Transmitting file data .........
Committed revision 373180.


> Fix security vulnerability in jsp-examples
> ------------------------------------------
>
>          Key: GERONIMO-1540
>          URL: http://issues.apache.org/jira/browse/GERONIMO-1540
>      Project: Geronimo
>         Type: Bug
>   Components: sample apps
>     Versions: 1.0.1, 1.1
>     Reporter: Dave Colasurdo
>     Assignee: Kevan Miller
>      Fix For: 1.0.1, 1.1
>  Attachments: examples-cumulative.patch, geronimo-jsp-examples-tomcat-5.5.15-plus.war,
geronimo-servlet-examples-tomcat-5.5.15.war, jsp-examples.patch
>
> Oliver Karow has reported a cross-site scripting vulnerability in the Tomcat jsp-examples
that are included in Geronimo.  It fails on both Jetty and Tomcat.
> This can be reproduced with the following urls:
> http://localhost:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert('Gotcha')</script>
> http://localhost:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert(document.cookie)</script>
> This JIRA does not address a related problem in the admin console.  That problem is addressed
in GERONIMO-1474.
>  

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
   http://issues.apache.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see:
   http://www.atlassian.com/software/jira


Mime
View raw message