XSS vulnerability in RDF validation service

See 
<http://www.w3.org/RDF/Validator/ARPServlet?URI=http%3A%2F%2Fphilip.html5.org%2Fdemos%2Frdfa%2Fmisc02.html&PARSE=Parse+URI%3A+&TRIPLES_AND_GRAPH=PRINT_TRIPLES&FORMAT=PNG_EMBED>

The validator displays strings without any escaping, allowing arbitrary 
script code to be executed in the www.w3.org security context.

-- 
Philip Taylor
pjt47@cam.ac.uk

Received on Monday, 16 March 2009 22:53:05 UTC