Uploaded image for project: 'Continuum'
  1. Continuum
  2. CONTINUUM-1412

File Inclusion Vulnerability

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Closed
    • Critical
    • Resolution: Fixed
    • 1.1-beta-2
    • 1.1-beta-3
    • Security
    • None
    • Java version: 1.5.0_10
      OS name: "linux" version: "2.6.16.49-xen-osl4-ipsec-domu" arch: "i386"

    Description

      The value of the userDirectory variable used when calling workingCopy.action is not filtered properly. This gives anyone who can access workingCopy.action the ability to read any file on the file system with the permissions that jetty is running as.

      For example, let's say we have continuum installed in /usr/local/continuum. Say we have a project named build-tools with a projectId of 10. Using the following URL, I can display the contents of /proc/version (see attached screenshot).

      http://some-server.domain.com:8080/continuum/workingCopy.action?projectId=10&projectName=build-tools&userDirectory=../../../../../../../../../proc/&file=version

      This is really bad if the user is running continuum as root because it gives the attacker access to every file on the file system.

      Attachments

        1. continuum.JPG
          37 kB
          Tom Cort
        2. CONTINUUM-1412.patch
          1 kB
          Tom Cort

        Activity

          People

            evenisse Emmanuel Venisse
            tcort Tom Cort
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: