Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible SQL Injections with postgis TIME filters #4834

Closed
tbonfort opened this issue Dec 31, 2013 · 0 comments
Closed

Possible SQL Injections with postgis TIME filters #4834

tbonfort opened this issue Dec 31, 2013 · 0 comments

Comments

@tbonfort
Copy link
Member

As part of @rouault 's WFS 2.0 work he discovered a SQL injection issue specific to WMS-Time and perhaps SOS services. It has to do with PostGIS and time validation. Based on Even's tests for WMS-Time the vulnerability is limited to unintended disclosure of data from the specific table, if specific conditions are met:

  • WMS-Time is configured
  • PostGIS is used
  • GetFeatureInfo output formats dump all attributes (e.g. gmlitems all)

Basically you can muck with the where clause but can’t execute secondary commands (e.g. delete …). It may be possible to access unintended data through the map itself (e.g. via a label item) but that seems pretty hard. Again, SOS services have not been examined.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant