Details
-
Bug
-
Status: Closed
-
Critical
-
Resolution: Fixed
-
1.1-beta-2
-
None
-
Java version: 1.5.0_10
OS name: "linux" version: "2.6.16.49-xen-osl4-ipsec-domu" arch: "i386"
Description
The value of the userDirectory variable used when calling workingCopy.action is not filtered properly. This gives anyone who can access workingCopy.action the ability to read any file on the file system with the permissions that jetty is running as.
For example, let's say we have continuum installed in /usr/local/continuum. Say we have a project named build-tools with a projectId of 10. Using the following URL, I can display the contents of /proc/version (see attached screenshot).
This is really bad if the user is running continuum as root because it gives the attacker access to every file on the file system.