summaryrefslogtreecommitdiffstats
path: root/WebContent/release-notes.html
diff options
context:
space:
mode:
authorMarc Englund <marc@vaadin.com>2014-02-11 15:37:12 +0200
committerMarc Englund <marc@vaadin.com>2014-02-11 15:37:12 +0200
commitfe6ea5791f916d8ff13f21ff54ac21039cb4a9c6 (patch)
treefef7499016b49049109cf474313dfe8f1778283d /WebContent/release-notes.html
parente680b8f55fadd00fc2a738296d44390eba322e32 (diff)
downloadvaadin-framework-fe6ea5791f916d8ff13f21ff54ac21039cb4a9c6.tar.gz
vaadin-framework-fe6ea5791f916d8ff13f21ff54ac21039cb4a9c6.zip
Release notes updated to describe #13310 #13311
Change-Id: Id1b612a74f2f8717f98a3dca81489425686237f7
Diffstat (limited to 'WebContent/release-notes.html')
-rw-r--r--WebContent/release-notes.html40
1 files changed, 39 insertions, 1 deletions
diff --git a/WebContent/release-notes.html b/WebContent/release-notes.html
index a11e526c3f..c7e7558e6a 100644
--- a/WebContent/release-notes.html
+++ b/WebContent/release-notes.html
@@ -41,6 +41,7 @@
<ul>
<li><a href="#overview">Overview of Vaadin
@version@ Release</a></li>
+ <li><a href="#security-fixes">Security fixes</a></li>
<li><a href="#changelog">Change log for Vaadin
@version@</a></li>
<li><a href="#enhancements">Enhancements in Vaadin
@@ -75,7 +76,44 @@
href="http://vaadin.com/download/release/@version-minor@/@version-minor@.0/release-notes.html">Release
Notes for Vaadin @version-minor@.0</a>.
</p>
-
+
+ <!-- ================================================================ -->
+ <h3 id="security-fixes">Security fixes in Vaadin Framework 7.1.11</h3>
+
+ <p>
+ Vaadin 7.1.11 fixes two security issues discovered during internal review.
+ </p>
+ <p><b>Escaping of OptionGroup item icon URLs</b></p>
+ <p>
+ The issue affects OptionGroup with item icons. Proper escaping of the
+ src-attribute on the client side was not ensured when using icons for
+ OptionGroup items. This could potentially, in certain situations, allow
+ a malicious user to inject content, such as javascript, in order to
+ perform a cross-site scripting (XSS) attack.
+ </p>
+ <p>
+ In order for an application to be vulnerable, user provided input must
+ be used to form a URL used to display an icon for an OptionGroup item,
+ when showing that Option Group to other users.<br/>
+ The vulnerability has been classified as moderate, due to it's limited
+ application.
+ </p>
+ <p><b>Escaping of URLs in Util.getAbsoluteUrl()</b></p>
+ <p>
+ The client side Util.getAbsoluteUrl() did not ensure proper escaping
+ of the given URL. This could potentially, in certain situations, allow
+ a malicious user to inject content, such as javascript, in order to
+ perform a cross-site scripting (XSS) attack.
+ </p>
+ <p>
+ The method is used internally by the framework in such a manner that it
+ is unlikely this attack vector can be utilized in practice. However,
+ third party components, or future use of the method, could make an
+ attack viable.<br/>
+ The vulnerability has been classified as moderate, due to it's limited
+ application.
+ </p>
+
<h3 id="changelog">Change log for Vaadin @version@</h3>
<p>This release includes the following closed issues:</p>