Details
-
Type:
Bug
-
Status: Closed
-
Priority:
Major
-
Resolution: Fixed
-
Affects Version/s: 1.7.1
-
Component/s: Framework
-
Labels:None
-
Environment:All
-
Support Case References:
Description
AppScan identified a "Link Injection" vulnerability that is related to the ICEfaces code library. The detail is provided below :
[2 of 53] Link Injection (facilitates Cross-Site Request Forgery)
Severity: Medium
Test Type: Application
Vulnerable URL: http://edsdev.blueweb.bcbsma.com:81/dmreg/block/send-receive-updates
(Parameter = ice.focus)
Remediation Tasks: Filter out hazardous characters from user input
Variant 1 of 132 [ID=15343]
The following changes were applied to the original request:
? Set parameter 'ice.focus's value to '%22%27%3E%3CIMG+SRC%3D%22%
2FWF_XSRF.html%22%3E'
Validation In Response:
? Fix.start('mainForm:
_id35:0:historyPopup','/dmreg/xmlhttp/blank');Ice.Focus.setFocus('"'><IMG
SRC="/WF_XSRF.html">');//-269488648]]></content></update></updates>
Reasoning:
The test response contained a link to the file "WF_XSRF.html, which proves that the Cross-Site
Request Forgery attempt was successful
[2 of 53] Link Injection (facilitates Cross-Site Request Forgery)
Severity: Medium
Test Type: Application
Vulnerable URL: http://edsdev.blueweb.bcbsma.com:81/dmreg/block/send-receive-updates
(Parameter = ice.focus)
Remediation Tasks: Filter out hazardous characters from user input
Variant 1 of 132 [ID=15343]
The following changes were applied to the original request:
? Set parameter 'ice.focus's value to '%22%27%3E%3CIMG+SRC%3D%22%
2FWF_XSRF.html%22%3E'
Validation In Response:
? Fix.start('mainForm:
_id35:0:historyPopup','/dmreg/xmlhttp/blank');Ice.Focus.setFocus('"'><IMG
SRC="/WF_XSRF.html">');//-269488648]]></content></update></updates>
Reasoning:
The test response contained a link to the file "WF_XSRF.html, which proves that the Cross-Site
Request Forgery attempt was successful
Activity
Field | Original Value | New Value |
---|---|---|
Support Case References | https://www.icesoft.ca:4443/supportilla/show_bug.cgi?id=5065 |
Assignee | Deryk Sinotte [ deryk.sinotte ] |
Assignee | Deryk Sinotte [ deryk.sinotte ] | Mircea Toma [ mircea.toma ] |
Repository | Revision | Date | User | Message |
ICEsoft Public SVN Repository | #17308 | Thu Aug 07 14:27:07 MDT 2008 | mircea.toma | |
Files Changed | ||||
![]() |
Repository | Revision | Date | User | Message |
ICEsoft Public SVN Repository | #17309 | Thu Aug 07 14:27:20 MDT 2008 | mircea.toma | |
Files Changed | ||||
![]() |
Status | Open [ 1 ] | Resolved [ 5 ] |
Resolution | Fixed [ 1 ] |
Affects Version/s | 1.7.2 [ 10130 ] | |
Affects Version/s | 1.7.1 [ 10122 ] |
Fix Version/s | 1.7.2 [ 10130 ] | |
Affects Version/s | 1.7.1 [ 10122 ] | |
Affects Version/s | 1.7.2 [ 10130 ] |
Fix Version/s | 1.7.2RC1 [ 10140 ] | |
Fix Version/s | 1.7.2 [ 10130 ] |
Fix Version/s | 1.7.2 [ 10130 ] | |
Fix Version/s | 1.7.2RC1 [ 10140 ] |
Repository | Revision | Date | User | Message |
ICEsoft Public SVN Repository | #17749 | Wed Oct 08 15:39:02 MDT 2008 | mircea.toma | |
Files Changed | ||||
![]() |
Repository | Revision | Date | User | Message |
ICEsoft Public SVN Repository | #17750 | Wed Oct 08 15:40:17 MDT 2008 | mircea.toma | |
Files Changed | ||||
![]() |
Resolution | Fixed [ 1 ] | |
Status | Resolved [ 5 ] | Reopened [ 4 ] |
Fix Version/s | 1.8DR#2 [ 10142 ] | |
Fix Version/s | 1.7.2 [ 10130 ] |
Repository | Revision | Date | User | Message |
ICEsoft Public SVN Repository | #17795 | Tue Oct 21 05:04:07 MDT 2008 | mircea.toma | |
Files Changed | ||||
![]() |
Status | Reopened [ 4 ] | Resolved [ 5 ] |
Resolution | Fixed [ 1 ] |
Fix Version/s | 1.8 [ 10161 ] |
Status | Resolved [ 5 ] | Closed [ 6 ] |
Assignee | Mircea Toma [ mircea.toma ] |
The value of ice.focus is written back to the page, but when it contains quote characters, such as
"'><IMG SRC="% 2FWF_XSRF.html">
the hidden input field is abnormally terminated and arbitrary HTML can be written to the page.
ICEfaces uses double cookie submission, so it is likely that the Cross-Site Request Forgery aspect of this attack is not possible. However, it should also not be possible to corrupt the page, so the rendering of ice.focus should be either filtered (for JSF component id syntax) or escaped.
Similar hidden fields should be investigated.