[jira] [Commented] (OFBIZ-11871) Server-Side Template Injection using Static

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

[jira] [Commented] (OFBIZ-11871) Server-Side Template Injection using Static

Nicolas Malin (Jira)

    [ https://issues.apache.org/jira/browse/OFBIZ-11871?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17169832#comment-17169832 ]

ASF subversion and git services commented on OFBIZ-11871:
---------------------------------------------------------

Commit 9a0bda00f818557f24cd22d404221791dd3601c2 in ofbiz-framework's branch refs/heads/release17.12 from Jacques Le Roux
[ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=9a0bda0 ]

Fixed: Server-Side Template Injection using Static (OFBIZ-11871)

Thanks to Alvaro's explanations, the problem was in MacroFormRenderer where, for
lookups, we retrieve _LAST_VIEW_NAME_ as a parameter without encoding it.

Got hard conflicts, all done by hand.

Thanks: Alvaro for advice


> Server-Side Template Injection using Static
> -------------------------------------------
>
>                 Key: OFBIZ-11871
>                 URL: https://issues.apache.org/jira/browse/OFBIZ-11871
>             Project: OFBiz
>          Issue Type: Sub-task
>          Components: ALL COMPONENTS
>    Affects Versions: 17.12.03
>            Reporter: Jacques Le Roux
>            Assignee: Jacques Le Roux
>            Priority: Major
>
> Alvaro Munoz <[hidden email]> from the GitHub Security Lab ([hidden email]) reported a Server-Side Template Injection that uses "Static" to the OFBiz security team, and we thank him for that.
> I'll later quote here his email message when the vulnerability will be fixed. It's a post-auth vulnerability so we did not ask for a CVE.
> Note: this vulnerabitly leads to Remote Code Execution (RCE)



--
This message was sent by Atlassian Jira
(v8.3.4#803005)