XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done
    • Icon: Critical Critical
    • 4.3.0.GA_CP09, 4.2.0.GA_CP10
    • 4.2.0.GA_CP09, 4.3.0.GA_CP08
    • Seam
    • None
    • Release Notes
    • Hide
      An input sanitization flaw was found in the way JBoss Seam processed certain parametrized JBoss Expression Language (EL) expressions. A remote attacker could use this flaw to execute parameterless methods on Seam components via a URL, containing appended, specially-crafted expression language parameters, provided to certain applications based on the JBoss Seam framework.
      Red Hat would like to thank Meder Kydyraliev of the Google Security Team for responsibly reporting this issue.
      Show
      An input sanitization flaw was found in the way JBoss Seam processed certain parametrized JBoss Expression Language (EL) expressions. A remote attacker could use this flaw to execute parameterless methods on Seam components via a URL, containing appended, specially-crafted expression language parameters, provided to certain applications based on the JBoss Seam framework. Red Hat would like to thank Meder Kydyraliev of the Google Security Team for responsibly reporting this issue.
    • Documented as Resolved Issue

      The Seam 2.x actionOutcome parameter issue (JBPAPP-4714, JBPAPP-4717) affects also to some degree Seam 1.x. The injected code however cannot contain method parameters, so it's probably harmless, but steps to sanitize it should be taken.

      For example in the booking application following code can be used to retrieve user's password (in the address bar)
      http://localhost:8080/seam-booking/home.seam?actionOutcome=/x.html?password%3d%23

      {user.password}

              mnovotny@redhat.com Marek Novotny
              oskutka@redhat.com Ondrej Skutka
              Votes:
              0 Vote for this issue
              Watchers:
              0 Start watching this issue

                Created:
                Updated:
                Resolved: