[ 
https://issues.apache.org/jira/browse/WW-3668?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13079913#comment-13079913
 ] 

Philip Luppens commented on WW-3668:
------------------------------------

Thank you for bringing this to our attention. However, we must stress that it's 
not considered a good practice to report vulnerabilities 'in the open'. There 
are special email addresses for reporting security issues, so that they can be 
investigated (and resolved) before publication of the vulnerability.

> Vulnerability: User input is evaluated as an OGNL expression when there's a 
> conversion error.
> ---------------------------------------------------------------------------------------------
>
>                 Key: WW-3668
>                 URL: https://issues.apache.org/jira/browse/WW-3668
>             Project: Struts 2
>          Issue Type: Bug
>          Components: Core Interceptors
>    Affects Versions: 2.2.3
>         Environment: Struts 2.2.3
> Tomcat 7.0.19
>            Reporter: Hideyuki Suzumi
>
> 1. Run "Struts Showcase".
> 2. Click "Validation".
> 3. Click "Field Validators".
> 4. Type "<' + #application + '>" in the "Integer Validator Field".
> 5. Click "Submit".
> 6. You can get all "application" scoped variables in the "Integer Validator 
> Field".
> Please fix ConversionErrorInterceptor and 
> RepopulateConversionErrorFieldValidatorSupport.
> com.opensymphony.xwork2.interceptor.ConversionErrorInterceptor
> 87:        return "'" + value + "'";
> com.opensymphony.xwork2.validator.validators.RepopulateConversionErrorFieldValidatorSupport
> 175:                    fakeParams.put(fullFieldName, "'" + tmpValue[0] + 
> "'");
> 182:                fakeParams.put(fullFieldName, "'" + tmpValue + "'");

--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to