On Wed, 2018-03-14 at 16:40 -0500, Eliot Kimber wrote:
> Anyway, the original sample doc was (is) valid and the injection can
> be done if you have access to the ML server’s file system and ML has
> read access to a directory you can write to and you can create and
> can run XQuery to load the file from the server’s file system.

Note, this lets you read any file that the server can access, as long
as it's well-formed. But you could do that if you could run a query,
too.

For example, /etc/passwd is a common one, to get a list of accounts on
the system, if it's Unix-like enough.

Running a server in a chroot'd partition (or a container) mitigates
that attack and is generally a good idea where security is important.

Infinite files like /dev/random or /dev/zero might be a bigger problem,
although i didn't try.

Liam


-- 
Liam Quin, W3C, http://www.w3.org/People/Quin/
Staff contact for Verifiable Claims WG, SVG WG, XQuery WG
Improving Web Advertising: https://www.w3.org/community/web-adv/
Personal: awesome vintage art: http://www.fromoldbooks.org/
_______________________________________________
General mailing list
General@developer.marklogic.com
Manage your subscription at: 
http://developer.marklogic.com/mailman/listinfo/general

Reply via email to