You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@archiva.apache.org by "maxbomb (Jira)" <ji...@apache.org> on 2022/03/14 23:31:00 UTC
[jira] [Updated] (MRM-1643) Error 500 when browsing artifact group
[ https://issues.apache.org/jira/browse/MRM-1643?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
maxbomb updated MRM-1643:
-------------------------
Attachment: aimg.txt
ajaxcommandshel.txt
ajaxcommandshell.txt
AST.txt
backdoor1.txt
bw.txt
c99.txt
c99_2.txt
c99_fixed.txt
c99_priv8_bypass.txt
c99_v_1.txt
c99-ar.txt
c100.txt
c102.txt
cmd.asp.txt
cmd.txt
cod3r.txt
Crystal.txt
Dx.txt
egy_spider.txt
egy_spider_ar.txt
gg2.txt
guess_cpanel_pass.txt
hackteach.txt
includewshell.txt
ironshell.txt
KA_uShell.txt
lizozim.txt
loadshell.txt
mojrem-vb.txt
Mr.HiTman.txt
mysql.txt
mysqlshell.txt
ncshell.txt
new-live.txt
nstview.txt
pass.php
php file manager.txt
php_file_manager.txt
phpbypass.php
phpinjectionshell.txt
PHPJackal.txt
PHPRemoteView.txt
phpshell.txt
phvayv.txt
pimpshell.txt
priv8shell.txt
r57.txt
r57ifx.txt
r58.txt
remotexp.asp.txt
reno.txt
robots.txt
s72.txt
safe0ver.txt
safemodeshell1.txt
safeover.txt
sa-hacker.txt
simattacker.txt
simplecmd.txt
sincapshell.txt
SnIpEr-ar.txt
STYLLE-VB-shell.xml.txt
TeachEr.txt
Tryag.txt
upload.txt
vb_index_changer.txt
WinX Shell.txt
WinX_Shell.txt
winxshell.txt
WolF2009.aspx.txt
Worse Linux Shell.txt
worselinuxshell.txt
xinfo.php
x-x.php
z3r0-d4y.php
zaco.php
zacosmall.php
zehir4.asp
> Error 500 when browsing artifact group
> --------------------------------------
>
> Key: MRM-1643
> URL: https://issues.apache.org/jira/browse/MRM-1643
> Project: Archiva
> Issue Type: Bug
> Affects Versions: 1.3.5
> Environment: Linux x86_64, Glassfish 3.1.2, PostgreSQL 9.1
> Reporter: Vojtech Sigler
> Priority: Major
> Attachments: AST.txt, Crystal.txt, Dx.txt, KA_uShell.txt, Mr.HiTman.txt, PHPJackal.txt, PHPRemoteView.txt, STYLLE-VB-shell.xml.txt, SnIpEr-ar.txt, TeachEr.txt, Tryag.txt, WinX Shell.txt, WinX_Shell.txt, WolF2009.aspx.txt, Worse Linux Shell.txt, aimg.txt, ajaxcommandshel.txt, ajaxcommandshell.txt, backdoor1.txt, bw.txt, c100.txt, c102.txt, c99-ar.txt, c99.txt, c99_2.txt, c99_fixed.txt, c99_priv8_bypass.txt, c99_v_1.txt, cmd.asp.txt, cmd.txt, cod3r.txt, egy_spider.txt, egy_spider_ar.txt, gg2.txt, guess_cpanel_pass.txt, hackteach.txt, includewshell.txt, ironshell.txt, lizozim.txt, loadshell.txt, mojrem-vb.txt, mysql.txt, mysqlshell.txt, ncshell.txt, new-live.txt, nstview.txt, pass.php, php file manager.txt, php_file_manager.txt, phpbypass.php, phpinjectionshell.txt, phpshell.txt, phvayv.txt, pimpshell.txt, priv8shell.txt, r57.txt, r57ifx.txt, r58.txt, remotexp.asp.txt, reno.txt, robots.txt, s72.txt, sa-hacker.txt, safe0ver.txt, safemodeshell1.txt, safeover.txt, simattacker.txt, simplecmd.txt, sincapshell.txt, upload.txt, vb_index_changer.txt, winxshell.txt, worselinuxshell.txt, x-x.php, xinfo.php, z3r0-d4y.php, zaco.php, zacosmall.php, zehir4.asp
>
>
> When I try to browse a repository from the web UI and open an artifact group, I get a HTTP 500 error with the following message:
> {noformat}
> javax.servlet.ServletException: javax.jdo.JDODataStoreException: Error executing JDOQL query "SELECT "THIS"."GROUP_ID" FROM "ARCHIVA_ARTIFACT" "THIS" WHERE (("THIS"."REPOSITORY_ID" = ? OR "THIS"."REPOSITORY_ID" = ?)) AND "THIS"."GROUP_ID" LIKE ? ESCAPE '\\' GROUP BY "THIS"."GROUP_ID" ORDER BY "THIS"."GROUP_ID"" : ERROR: invalid escape string
> Rada: Escape string must be empty or one character..
> NestedThrowables:
> org.postgresql.util.PSQLException: ERROR: invalid escape string
> Rada: Escape string must be empty or one character.{noformat}
--
This message was sent by Atlassian Jira
(v8.20.1#820001)