-
Bug
-
Resolution: Done
-
Critical
-
6.4.0
When uploading a pom.xml with errors to business central using Artifact Repository, it is possible to execute malicious scripts because the error message is showed in an HTML mode, allowing scripts execution. Take for example the following script.pom.xml:
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd"> <modelVersion>4.0.0</modelVersion> <groupId>example</groupId> <artifactId>inject-script</artifactId> <version>1.0</version> <dependencies> <dependency> <groupId>example</groupId> <artifactId>}}proj<script>alert(1)</script></artifactId> <version>1.0</version> </dependency> </dependencies> </project>
- clones
-
RHPAM-173 Artifact repository upload functionality allows malicious code injection
- Closed