Dear Ivy team Just recently we had a security audit which reported that our app is vulnerable to XSS attacks. The issue is that the Primeface input fields (whatever control) seem not to be escaped. By default it should be escape="true" but it seems it's escape="false" which would be really bad (for all Ivy based applications). Any idea why this is the case ? May be an outdated jsf lib ? Best regards John |
Once you sign in you will be able to subscribe for any updates here
By RSS:Markdown Basics
Tags:
Asked: 03.10.2019 at 08:33
Seen: 2,543 times
Last updated: 09.10.2019 at 04:17
I can not see an 'escape' attribute on
p:inputText
or similar elements. To which control are you exactly referring?May be I have to ask it more generally. If I have a input field and I enter :
This is my test <script>alert(123)</script>
This text gets stored exactly as it is and if we use a JSF and/or Primefaces control to display it, we get a JS alert 123-dialog.
So what is the Ivy approach - do I have to encode it after the text got inputed or must all text get displayed escaped. I would assume this topic has already been investigated by you and there must be some rules to follow to avoid XSS.