ElevenPaths finds a XSS problem in Play Framework
When Play framework had a problem with the URL parameter. When it parses the view, it translates it to an URL that will work as a GET reques t. If the parameter value starts with ":", some exception is launched and fails to escape the value:
@{Controller.action(URLparameterWithInjection)}
How to get the URL parameter:

Then, URL goes through the program. Example of XSS injection encoded:

But once we "inject" the ":" character...

There is a condition that does not allow to encode the injection. In fact, the code in Play Framework made it clear:

Whenever the view is interpreted, when translating to an URL that will work as a GET request, we may use it as a parameter to print it as a result.
We developed a PoC and sent it to developers. Versions 1.2.7 to 1.3.0 have been tested to be vulnerable. Just a week after making them aware of the problem, this alert has been released, that solves the problem: https://www.playframework.com/security/vulnerability/20150506-XssUrlParamerter.