[ https://issues.apache.org/jira/browse/CMIS-938?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14709126#comment-14709126 ]
Florian Müller commented on CMIS-938: ------------------------------------- The whole InMemory repository is for testing and demo purposes only. See: https://chemistry.apache.org/java/developing/repositories/dev-repositories-inmemory.html > Cross-Site Scripting: Reflected Vulnerability in index.jsp > ---------------------------------------------------------- > > Key: CMIS-938 > URL: https://issues.apache.org/jira/browse/CMIS-938 > Project: Chemistry > Issue Type: Bug > Components: opencmis-client > Affects Versions: OpenCMIS 0.13.0 > Reporter: Donald Kwakkel > > The method _jspService() in index.jsp sends unvalidated data to a web browser > on line 131, which can result in the browser executing malicious code. > Explanation: > Cross-site scripting (XSS) vulnerabilities occur when: > 1. Data enters a web application through an untrusted source. In the case of > Reflected XSS, the untrusted source is typically a web request, while in the > case of Persisted (also known as Stored) XSS it is typically a database or > other back-end datastore. > In this case the data enters at getHeader() in > ProxyHttpServletRequestWrapper.java at line 41. > 2. The data is included in dynamic content that is sent to a web user without > being validated. > In this case the data is sent at println() in index.jsp at line 131. -- This message was sent by Atlassian JIRA (v6.3.4#6332)