Vert.x-Web vulnerable to Stored Cross-site Scripting in directory listings via file names
In the StaticHandlerImpl#sendDirectoryListing(…) method under the text/html branch, file and directory names are directly embedded into the href, title, and link text without proper HTML escaping. As a result, in environments where an attacker can control file names, injecting HTML/JavaScript is possible. Simply accessing the directory listing page will trigger an XSS. Affected Code: File: vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java Lines: 709–713: normalizedDir is constructed without escaping 714–731: <li><a …> elements insert file names …