Frank Bergmann - 2020-05-01

Hi,

We have developed a patch for the most serious SQL injection vulnerability found in the report.
Please contact info@project-open.com for details.

We would consider the other (non-persistent XSS) vulnerability as not that critical, because:
1. Quite some knowledge is required to create a suitable URLs,
2. most ]po[ systems run locally and
3. an attacker would have to make the victim click on a forged link.

In order to consistently fix the XSS issues, we would have to update the OpenACS core version to 5.10 and to perform a considerable of changes in the ]po[ code with the possibility of errors.

So we have decided to speed-up the development of ]po[ V5.1 with focus only on these issues.

Best regards
Frank