Hi 

With François and Nourredine, we have just checked the Tapestry 5.2.4
datefield.js. 
A part of our patch was not included into the new javascript file. We still
have an vulnerability in the 
sendServerRequest method. We can inject some JavaScript code for example,
using the Paros software.

But the methods escape or escapeHTML do not work in this case. I am working
on that bug. 

Do I have to recreate a new JIRA? 

Emmanuel


-- 
View this message in context: 
http://tapestry.1045711.n5.nabble.com/XSS-vulnerability-in-calendar-component-tp2433878p3377170.html
Sent from the Tapestry - User mailing list archive at Nabble.com.

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tapestry.apache.org
For additional commands, e-mail: users-h...@tapestry.apache.org

Reply via email to