[ 
https://issues.apache.org/jira/browse/WW-3668?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13082471#comment-13082471
 ] 

Maurizio Cucchiara commented on WW-3668:
----------------------------------------

Hi guys,
after some tests I have to say that this scenario is worst than I thought.
It also works on Jetty , furthermore it allows to inject any arbitrary value 
inside the session.
We should strongly consider to sanitize the user input and release a new S2 
release ASAP.
I am continuing to investigate on it.

> Vulnerability: User input is evaluated as an OGNL expression when there's a 
> conversion error.
> ---------------------------------------------------------------------------------------------
>
>                 Key: WW-3668
>                 URL: https://issues.apache.org/jira/browse/WW-3668
>             Project: Struts 2
>          Issue Type: Bug
>          Components: Core Interceptors
>    Affects Versions: 2.2.3
>         Environment: Struts 2.2.3
> Tomcat 7.0.19
>            Reporter: Hideyuki Suzumi
>
> 1. Run "Struts Showcase".
> 2. Click "Validation".
> 3. Click "Field Validators".
> 4. Type "<' + #application + '>" in the "Integer Validator Field".
> 5. Click "Submit".
> 6. You can get all "application" scoped variables in the "Integer Validator 
> Field".
> Please fix ConversionErrorInterceptor and 
> RepopulateConversionErrorFieldValidatorSupport.
> com.opensymphony.xwork2.interceptor.ConversionErrorInterceptor
> 87:        return "'" + value + "'";
> com.opensymphony.xwork2.validator.validators.RepopulateConversionErrorFieldValidatorSupport
> 175:                    fakeParams.put(fullFieldName, "'" + tmpValue[0] + 
> "'");
> 182:                fakeParams.put(fullFieldName, "'" + tmpValue + "'");

--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to