[ 
https://issues.apache.org/jira/browse/CXF-6216?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14288148#comment-14288148
 ] 

Donald Kwakkel commented on CXF-6216:
-------------------------------------

The OWASP site has a good explanation: 
https://www.owasp.org/index.php/Types_of_Cross-Site_Scripting. The kind which 
occur in this code is Reflected XSS. How to handle it is explained here: 
https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet.

> No output sanitizing in FormattedServiceListWriter 
> ---------------------------------------------------
>
>                 Key: CXF-6216
>                 URL: https://issues.apache.org/jira/browse/CXF-6216
>             Project: CXF
>          Issue Type: Bug
>          Components: Core
>    Affects Versions: 3.0.1
>            Reporter: Donald Kwakkel
>
> No output sanitizing is done, which makes the code vulnerable for injection. 
> I do not have a specific use case, but it is good habit to do. Maybe you can 
> use the OWASP Sanitizer: 
> https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer_Project
> One example from the file: 
>         writer.write("<span class=\"field\">Endpoint address:</span> " + 
> "<span class=\"value\">"
>                      + absoluteURL + "</span>");



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to