[ https://issues.apache.org/jira/browse/CXF-6216?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14288148#comment-14288148 ]
Donald Kwakkel commented on CXF-6216: ------------------------------------- The OWASP site has a good explanation: https://www.owasp.org/index.php/Types_of_Cross-Site_Scripting. The kind which occur in this code is Reflected XSS. How to handle it is explained here: https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet. > No output sanitizing in FormattedServiceListWriter > --------------------------------------------------- > > Key: CXF-6216 > URL: https://issues.apache.org/jira/browse/CXF-6216 > Project: CXF > Issue Type: Bug > Components: Core > Affects Versions: 3.0.1 > Reporter: Donald Kwakkel > > No output sanitizing is done, which makes the code vulnerable for injection. > I do not have a specific use case, but it is good habit to do. Maybe you can > use the OWASP Sanitizer: > https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer_Project > One example from the file: > writer.write("<span class=\"field\">Endpoint address:</span> " + > "<span class=\"value\">" > + absoluteURL + "</span>"); -- This message was sent by Atlassian JIRA (v6.3.4#6332)