Details
-
Bug
-
Status: Resolved
-
Critical
-
Resolution: Fixed
-
0.6
-
None
-
Don't Know (Unsure) - The default level
Description
The web-grid framework currently has a security vulnerability that allows an attacker to list and download any file on the system.
As it turns out, the "OFSN" parameter within the URL requests passed to registered product handlers is not validated (for accessing UNIX-style parent directory codes) by either web-grid or the product handlers themselves. Thus, arbitrary file paths (containing the UNIX-style parent directory codes) can be sent in and, in effect, allow the downloading of any file on the system.
e.g. http://localhost:8080/web-grid-0.7-SNAPSHOT/prod?q=OFSN=/../../../../../etc/passwd+AND+RT%3DRAW
I'm elevating this issue to critical level.