Uploaded image for project: 'SpagoBI'
  1. SpagoBI
  2. SPAGOBI-1885

Remote code execution via XSL extensions

    Details

    • Type: Bug
    • Status: Resolved
    • Priority: Blocker
    • Resolution: Fixed
    • Affects Version/s: 5.0.0
    • Fix Version/s: 5.1.0
    • Labels:
      None
    • Bug type:
      Regression bug

      Description

      Anyone who has permission to define a document that uses the accessibility engine can supply an XSL file that will be used to transform the data in the presentation view. SpagoBI is using Xalan to perform the transformation, and there's two problems:

      1) FEATURE_SECURE_PROCESSING is not set. This means an attacker can provide an XSL document with embedded Java code, which will be executed on the server.

      2) SpagoBI is using Xalan 2.6.0. A flaw in this version means that if with FEATURE_SECURE_PROCESSING set, an attacker can bypass the restrictions, and provide XSL documents with embedded Java code. To address this, you need to upgrade to >= 2.7.2:

      https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0107

      I have provided a reproducer to the developers via email.

        Attachments

          Activity

            People

            • Assignee:
              francesm Monica Franceschini
              Reporter:
              dfj.spw David Jorm
            • Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: