-
Bug
-
Resolution: Done
-
Critical
-
6.x.x
When uploading a pom.xml with errors to business central using Artifact Repository, it is possible to execute malicious scripts because the error message is showed in an HTML mode, allowing scripts execution. Take for example the following script.pom.xml:
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd"> <modelVersion>4.0.0</modelVersion> <groupId>example</groupId> <artifactId>inject-script</artifactId> <version>1.0</version> <dependencies> <dependency> <groupId>example</groupId> <artifactId>}}proj<script>alert(1)</script></artifactId> <version>1.0</version> </dependency> </dependencies> </project>
- is cloned by
-
RHBPMS-4627 CVE-2017-7463 business-central: Reflected XSS in artifact upload error message [bpms-6.4.x]
- Closed