roller-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Anil Gangolli (JIRA)" <>
Subject [jira] Commented: (ROL-1766) Cross-site scripting vulnerability in Roller search term treatment
Date Wed, 17 Dec 2008 17:23:19 GMT


Anil Gangolli commented on ROL-1766:

This issue was originally surfaced and fixed in June 2008.

The issue is fixed in the trunk by the following revision:

There is also a patch to the weblog.vm template that was circulated on roller mailing lists:

This provides a way for users to fix this locally without upgrading to a more recent build.

However, neither fix has been put in any released version; it has not been backported to existing

I will attach the patch for weblog.vm as of revision 662259  (in the above referenced e-mail)
to this bug as well.

> Cross-site scripting vulnerability in Roller search term treatment
> ------------------------------------------------------------------
>                 Key: ROL-1766
>                 URL:
>             Project: Roller
>          Issue Type: Bug
>          Components: Search
>    Affects Versions: 2.3, 3.0, 3.1, 4.0
>         Environment: any
>            Reporter: Anil Gangolli
>            Assignee: Roller Unassigned
> The search term submitted to Roller as the value of the "q" parameter on search requests
(/search?q=query+terms) is echoed back in the default search form without escaping HTML tags.
> This can be converted to a cross-site scripting attack.

This message is automatically generated by JIRA.
You can reply to this email to add a comment to the issue online.

View raw message