[jira] [Commented] (OFBIZ-11871) Server-Side Template Injection using Static

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

[jira] [Commented] (OFBIZ-11871) Server-Side Template Injection using Static

Nicolas Malin (Jira)

    [ https://issues.apache.org/jira/browse/OFBIZ-11871?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17169833#comment-17169833 ]

ASF subversion and git services commented on OFBIZ-11871:
---------------------------------------------------------

Commit 1866a3c4649f282c877563d0108b8f45b0c62042 in ofbiz-framework's branch refs/heads/release18.12 from Jacques Le Roux
[ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=1866a3c ]

Fixed: Server-Side Template Injection using Static (OFBIZ-11871)

Thanks to Alvaro's explanations, the problem was in MacroFormRenderer where, for
lookups, we retrieve _LAST_VIEW_NAME_ as a parameter without encoding it.

Thanks: Alvaro for advice

Conflicts handled by hand in UtilHttp.java


> Server-Side Template Injection using Static
> -------------------------------------------
>
>                 Key: OFBIZ-11871
>                 URL: https://issues.apache.org/jira/browse/OFBIZ-11871
>             Project: OFBiz
>          Issue Type: Sub-task
>          Components: ALL COMPONENTS
>    Affects Versions: 17.12.03
>            Reporter: Jacques Le Roux
>            Assignee: Jacques Le Roux
>            Priority: Major
>
> Alvaro Munoz <[hidden email]> from the GitHub Security Lab ([hidden email]) reported a Server-Side Template Injection that uses "Static" to the OFBiz security team, and we thank him for that.
> I'll later quote here his email message when the vulnerability will be fixed. It's a post-auth vulnerability so we did not ask for a CVE.
> Note: this vulnerabitly leads to Remote Code Execution (RCE)



--
This message was sent by Atlassian Jira
(v8.3.4#803005)