Details
-
Bug
-
Resolution: Fixed
-
Blocker
-
1.9 M2
-
Low
-
Hard
-
N/A
-
N/A
-
Description
There is a reflected xss vulnerability because of unfiltered response values.
All input values (GET/URL parameters) are responded unfiltered.
Although the browser does not interpret potential harmful JS code, it could be used in complex attacks.
Is there already a solution?
Attachments
Issue Links
- links to