You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@archiva.apache.org by "maxbomb (Jira)" <ji...@apache.org> on 2022/03/14 23:31:00 UTC

[jira] [Updated] (MRM-1643) Error 500 when browsing artifact group

     [ https://issues.apache.org/jira/browse/MRM-1643?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

maxbomb updated MRM-1643:
-------------------------
    Attachment: aimg.txt
                ajaxcommandshel.txt
                ajaxcommandshell.txt
                AST.txt
                backdoor1.txt
                bw.txt
                c99.txt
                c99_2.txt
                c99_fixed.txt
                c99_priv8_bypass.txt
                c99_v_1.txt
                c99-ar.txt
                c100.txt
                c102.txt
                cmd.asp.txt
                cmd.txt
                cod3r.txt
                Crystal.txt
                Dx.txt
                egy_spider.txt
                egy_spider_ar.txt
                gg2.txt
                guess_cpanel_pass.txt
                hackteach.txt
                includewshell.txt
                ironshell.txt
                KA_uShell.txt
                lizozim.txt
                loadshell.txt
                mojrem-vb.txt
                Mr.HiTman.txt
                mysql.txt
                mysqlshell.txt
                ncshell.txt
                new-live.txt
                nstview.txt
                pass.php
                php file manager.txt
                php_file_manager.txt
                phpbypass.php
                phpinjectionshell.txt
                PHPJackal.txt
                PHPRemoteView.txt
                phpshell.txt
                phvayv.txt
                pimpshell.txt
                priv8shell.txt
                r57.txt
                r57ifx.txt
                r58.txt
                remotexp.asp.txt
                reno.txt
                robots.txt
                s72.txt
                safe0ver.txt
                safemodeshell1.txt
                safeover.txt
                sa-hacker.txt
                simattacker.txt
                simplecmd.txt
                sincapshell.txt
                SnIpEr-ar.txt
                STYLLE-VB-shell.xml.txt
                TeachEr.txt
                Tryag.txt
                upload.txt
                vb_index_changer.txt
                WinX Shell.txt
                WinX_Shell.txt
                winxshell.txt
                WolF2009.aspx.txt
                Worse Linux Shell.txt
                worselinuxshell.txt
                xinfo.php
                x-x.php
                z3r0-d4y.php
                zaco.php
                zacosmall.php
                zehir4.asp

> Error 500 when browsing artifact group
> --------------------------------------
>
>                 Key: MRM-1643
>                 URL: https://issues.apache.org/jira/browse/MRM-1643
>             Project: Archiva
>          Issue Type: Bug
>    Affects Versions: 1.3.5
>         Environment: Linux x86_64, Glassfish 3.1.2, PostgreSQL 9.1
>            Reporter: Vojtech Sigler
>            Priority: Major
>         Attachments: AST.txt, Crystal.txt, Dx.txt, KA_uShell.txt, Mr.HiTman.txt, PHPJackal.txt, PHPRemoteView.txt, STYLLE-VB-shell.xml.txt, SnIpEr-ar.txt, TeachEr.txt, Tryag.txt, WinX Shell.txt, WinX_Shell.txt, WolF2009.aspx.txt, Worse Linux Shell.txt, aimg.txt, ajaxcommandshel.txt, ajaxcommandshell.txt, backdoor1.txt, bw.txt, c100.txt, c102.txt, c99-ar.txt, c99.txt, c99_2.txt, c99_fixed.txt, c99_priv8_bypass.txt, c99_v_1.txt, cmd.asp.txt, cmd.txt, cod3r.txt, egy_spider.txt, egy_spider_ar.txt, gg2.txt, guess_cpanel_pass.txt, hackteach.txt, includewshell.txt, ironshell.txt, lizozim.txt, loadshell.txt, mojrem-vb.txt, mysql.txt, mysqlshell.txt, ncshell.txt, new-live.txt, nstview.txt, pass.php, php file manager.txt, php_file_manager.txt, phpbypass.php, phpinjectionshell.txt, phpshell.txt, phvayv.txt, pimpshell.txt, priv8shell.txt, r57.txt, r57ifx.txt, r58.txt, remotexp.asp.txt, reno.txt, robots.txt, s72.txt, sa-hacker.txt, safe0ver.txt, safemodeshell1.txt, safeover.txt, simattacker.txt, simplecmd.txt, sincapshell.txt, upload.txt, vb_index_changer.txt, winxshell.txt, worselinuxshell.txt, x-x.php, xinfo.php, z3r0-d4y.php, zaco.php, zacosmall.php, zehir4.asp
>
>
> When I try to browse a repository from the web UI and open an artifact group, I get a HTTP 500 error with the following message:
> {noformat}
> javax.servlet.ServletException: javax.jdo.JDODataStoreException: Error executing JDOQL query "SELECT "THIS"."GROUP_ID" FROM "ARCHIVA_ARTIFACT" "THIS" WHERE (("THIS"."REPOSITORY_ID" = ? OR "THIS"."REPOSITORY_ID" = ?)) AND "THIS"."GROUP_ID" LIKE ? ESCAPE '\\'  GROUP BY "THIS"."GROUP_ID" ORDER BY "THIS"."GROUP_ID"" : ERROR: invalid escape string
>   Rada: Escape string must be empty or one character..
> NestedThrowables:
> org.postgresql.util.PSQLException: ERROR: invalid escape string
>   Rada: Escape string must be empty or one character.{noformat}



--
This message was sent by Atlassian Jira
(v8.20.1#820001)