roller-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Anil Gangolli (JIRA)" <j...@apache.org>
Subject [jira] Assigned: (ROL-1766) Cross-site scripting vulnerability in Roller search term treatment
Date Thu, 25 Dec 2008 22:27:20 GMT

     [ https://issues.apache.org/roller/browse/ROL-1766?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Anil Gangolli reassigned ROL-1766:
----------------------------------

    Assignee: Anil Gangolli  (was: Roller Unassigned)

> Cross-site scripting vulnerability in Roller search term treatment
> ------------------------------------------------------------------
>
>                 Key: ROL-1766
>                 URL: https://issues.apache.org/roller/browse/ROL-1766
>             Project: Roller
>          Issue Type: Bug
>          Components: Search
>    Affects Versions: 2.3, 3.0, 3.1, 4.0
>         Environment: any
>            Reporter: Anil Gangolli
>            Assignee: Anil Gangolli
>         Attachments: ROL-1766-weblog-vm.patch
>
>
> The search term submitted to Roller as the value of the "q" parameter on search requests
(/search?q=query+terms) is echoed back in the default search form without escaping HTML tags.
> This can be converted to a cross-site scripting attack.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


Mime
View raw message