[ http://jira.codehaus.org/browse/CONTINUUM-679?page=all ]
     
Christian Gruber closed CONTINUUM-679:
--------------------------------------

    Resolution: Duplicate

> Insecure html in build output leads to bad html rendering - could be used for 
> malicious cross-site scripting.
> -------------------------------------------------------------------------------------------------------------
>
>          Key: CONTINUUM-679
>          URL: http://jira.codehaus.org/browse/CONTINUUM-679
>      Project: Continuum
>         Type: Bug

>   Components: Web interface
>     Versions: 1.0.3
>     Reporter: Christian Gruber
>     Priority: Critical

>
>
> In a custom maven2 build that calls an ant script to invoke weblogic's 
> compiler for workshop, some warning output includes a warning about the 
> "<textarea>" tag.  Continuum does not convert < and > into lt and gt 
> entities.  Since the build output is in another textarea it is sometimes not 
> a problem.  However, some browsers render nested textareas, and the remaining 
> build log output is contained within the inner textarea.
> While this is annoying, it is dangerous.  One need only alter the build 
> script to <echo> something more malicious - say something with javascript - 
> to cause damage.
> The fix is to pre-process the output to strip it of any html tag content.  
> This bug should be reproducable by creating a small build.xml that echo's a 
> <textarea> and calling it from a maven pom file.  

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
   http://jira.codehaus.org/secure/Administrators.jspa
-
For more information on JIRA, see:
   http://www.atlassian.com/software/jira

Reply via email to