Details
-
Bug
-
Resolution: Fixed
-
Blocker
-
4.2-milestone-2
-
tomcat
-
Integration
-
Unknown
-
N/A
-
Description
It's possible to get access and read configuration files by using URLs such as http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false
This can be reproduced apparently on any tomcat, and it's easily reproduced on a docker image of XWiki. This could allow an attacker to get access to sensitive data such as all credentials of the DB.
From first analysis vulnerable code seems to be: https://github.com/xwiki/xwiki-platform/blob/f34d6bb28caf7f862eb5d98ea844b734924a8865/xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/web/sx/SxResourceSource.java#L59-L63
Attachments
Issue Links
- depends on
-
XCOMMONS-3327 Provide an internal helper to safely access ClassLoader resources
-
- Closed
-
- is caused by
-
XWIKI-8148 Add support for loading Skin Extension JS and CSS from JAR files
-
- Closed
-