[
https://issues.apache.org/jira/browse/OFBIZ-12582?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17496673#comment-17496673
]
Jacques Le Roux edited comment on OFBIZ-12582 at 2/26/22, 10:20 AM:
--------------------------------------------------------------------
Commit f65410ba1d6b13ea5edfb07aa43b65a8f296cb89 in ofbiz-framework's branch
refs/heads/release18.12 from Jacques Le Roux
[ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=f65410b ]
Fixed: Prevent post-Auth vulnerability: FreeMarker Bypass (OFBIZ-12582)
By inserting malicious content in the “Text” field from
“/content/control/updateLayoutSubContent” -> “Templates”, an attacker may
perform SSTI (Server-Side Template Injection) attacks, which can leverage
FreeMarker exposed objects to bypass restrictions and obtain RCE (Remote Code
Execution).
This fixes it by calling SecuredUpload::isValidText on the “Text” field content.
I'll check that there are no other attack opportunities...
Thanks: Matei "Mal" Badanoiu for reporting this post-auth vulnerabily
Conflicts handled by hand in ContentManagementServices.java
was (Author: jira-bot):
Commit f65410ba1d6b13ea5edfb07aa43b65a8f296cb89 in ofbiz-framework's branch
refs/heads/release18.12 from Jacques Le Roux
[ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=f65410b ]
Fixed: Prevent post-Auth vulnerability: FreeMarker Bypass (OFBIZ-12582)
By inserting malicious content in the “Text” field from
“/content/control/updateLayoutSubContent” -> “Templates”, an attacker may
perform SSTI (Server-Side Template Injection) attacks, which can leverage
FreeMarker exposed objects to bypass restrictions and obtain RCE (Remote Code
Execution).
This fixes it by calling SecuredUpload::isValidText on the “Text” field content.
I'll check that there are no other attack opportunities...
Thanks: Mal Aware <[email protected]> for reporting this post-auth vulnerabily
Conflicts handled by hand in ContentManagementServices.java
> Prevent post-Auth vulnerability: FreeMarker Bypass
> --------------------------------------------------
>
> Key: OFBIZ-12582
> URL: https://issues.apache.org/jira/browse/OFBIZ-12582
> Project: OFBiz
> Issue Type: Sub-task
> Components: content
> Affects Versions: 18.12.05
> Reporter: Jacques Le Roux
> Assignee: Jacques Le Roux
> Priority: Major
> Fix For: 18.12.06, 22.01.01
>
>
> By inserting malicious content in the “Text” field from
> “/content/control/updateLayoutSubContent” -> “Templates”, an attacker may
> perform SSTI (Server-Side Template Injection) attacks, which can leverage
> FreeMarker exposed objects to bypass restrictions and obtain RCE (Remote Code
> Execution).
> This FreeMarker SSTI was used to re-exploit vulnerability GHSL-2020-070
--
This message was sent by Atlassian Jira
(v8.20.1#820001)