Na Li created SENTRY-2120:
-----------------------------

             Summary: cross-site scripting vulnerability in LogLevelServlet
                 Key: SENTRY-2120
                 URL: https://issues.apache.org/jira/browse/SENTRY-2120
             Project: Sentry
          Issue Type: Bug
          Components: Sentry
    Affects Versions: 2.0.0, 2.1.0
            Reporter: Na Li
            Assignee: Na Li


LogLevelServlet.java has the following code

{code}
  public void doGet(HttpServletRequest request, HttpServletResponse response)
          throws ServletException, IOException {
    String logName = getParameter(request, "log");
    String level = getParameter(request, "level");
    response.setContentType("text/html;charset=utf-8");
    response.setStatus(HttpServletResponse.SC_OK);
    PrintWriter out = response.getWriter();

    if (logName != null) {
      Logger logInstance = LogManager.getLogger(logName);
      if (level == null) {
        out.write(String.format(FORMS_GET,
                escapeHtml(logName),
                logInstance.getEffectiveLevel().toString()));
      } else if (isLogLevelValid(level)) {
        logInstance.setLevel(Level.toLevel(level));
        out.write(String.format(FORMS_SET,
                escapeHtml(logName),
                level,
                level,
                logInstance.getEffectiveLevel().toString()));
      } else {
        response.sendError(HttpServletResponse.SC_BAD_REQUEST, "Invalid log 
level: " + level);
        return;
      }
    }
    out.write(FORMS_END);
    out.close();
    response.flushBuffer();
  }
{code}

As a result HTTP parameter is directly written to Servlet error page. Echoing 
this untrusted input allows for a reflected cross site scripting vulnerability. 
See http://en.wikipedia.org/wiki/Cross-site_scripting for more information.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to