You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@ofbiz.apache.org by "Jacques Le Roux (Jira)" <ji...@apache.org> on 2022/02/26 10:20:00 UTC

[jira] [Comment Edited] (OFBIZ-12582) Prevent post-Auth vulnerability: FreeMarker Bypass

    [ https://issues.apache.org/jira/browse/OFBIZ-12582?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17496665#comment-17496665 ] 

Jacques Le Roux edited comment on OFBIZ-12582 at 2/26/22, 10:19 AM:
--------------------------------------------------------------------

Commit 16c8afe5d0c103aabd05b8237820a86eea761e1c in ofbiz-framework's branch refs/heads/release22.01 from Jacques Le Roux
[ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=16c8afe ]

Fixed: Prevent post-Auth vulnerability: FreeMarker Bypass (OFBIZ-12582)

By inserting malicious content in the “Text” field from
“/content/control/updateLayoutSubContent” -> “Templates”, an attacker may
perform SSTI (Server-Side Template Injection) attacks, which can leverage
FreeMarker exposed objects to bypass restrictions and obtain RCE (Remote Code
Execution).

This fixes it by calling SecuredUpload::isValidText on the “Text” field content.
I'll check that there are no other attack opportunities...

Thanks:  Matei "Mal" Badanoiu for reporting this post-auth vulnerabily



was (Author: jira-bot):
Commit 16c8afe5d0c103aabd05b8237820a86eea761e1c in ofbiz-framework's branch refs/heads/release22.01 from Jacques Le Roux
[ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=16c8afe ]

Fixed: Prevent post-Auth vulnerability: FreeMarker Bypass (OFBIZ-12582)

By inserting malicious content in the “Text” field from
“/content/control/updateLayoutSubContent” -> “Templates”, an attacker may
perform SSTI (Server-Side Template Injection) attacks, which can leverage
FreeMarker exposed objects to bypass restrictions and obtain RCE (Remote Code
Execution).

This fixes it by calling SecuredUpload::isValidText on the “Text” field content.
I'll check that there are no other attack opportunities...

Thanks: Mal Aware <aw...@gmail.com> for reporting this post-auth vulnerabily


> Prevent post-Auth vulnerability: FreeMarker Bypass
> --------------------------------------------------
>
>                 Key: OFBIZ-12582
>                 URL: https://issues.apache.org/jira/browse/OFBIZ-12582
>             Project: OFBiz
>          Issue Type: Sub-task
>          Components: content
>    Affects Versions: 18.12.05
>            Reporter: Jacques Le Roux
>            Assignee: Jacques Le Roux
>            Priority: Major
>             Fix For: 18.12.06, 22.01.01
>
>
> By inserting malicious content in the “Text” field from “/content/control/updateLayoutSubContent” -> “Templates”, an attacker may perform SSTI (Server-Side Template Injection) attacks, which can leverage FreeMarker exposed objects to bypass restrictions and obtain RCE (Remote Code Execution). 
> This FreeMarker SSTI was used to re-exploit vulnerability GHSL-2020-070



--
This message was sent by Atlassian Jira
(v8.20.1#820001)