<%=StringUtil.getStackTrace(exception)%>
<%=StringUtil.getStackTrace(root)%>
...
- -----/
This XSS can be triggered by sending invalid data for numeric
parameters in several '.do' pages, causing the webapp to raise a
'java.lang.NumberFormatException' exception; this way,
'GenericError.jsp' will be called and it will print the data that
caused the exception without escaping HTML characters, leading to the
XSS vulnerability.
The following '.do' pages are affected, among others:
/-----
http://