Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Straighten security #751

Merged
merged 2 commits into from
Mar 8, 2019
Merged

Straighten security #751

merged 2 commits into from
Mar 8, 2019

Conversation

llelf
Copy link

@llelf llelf commented Mar 8, 2019

See commits for the details

XML External Entity attack

1. if HTTP API is exposed:

  - read any file on the system — via /search/extract, the error message leaks
    file content;

  - send HTTP «GET /» request to any host — by PUT/POSTing text/xml document,
    or via /search/extract.  This is also likely riak DoS if the host is
    attacker-controlled.

2. if PB API is exposed

  - send HTTP «GET /» request to any host — by PUT/POST, see above.

Example request:

<?xml version="1.0"?>
<!DOCTYPE meow [
  <!ENTITY xxe2 SYSTEM "/etc/passwd">
  <!ENTITY xxe1 SYSTEM "http://host/ping-me">
]>
<meow>&xxe1;</meow>
It doesn't check user-provided path in any way.
This allows overriding any file on the system with riak permissions.
@llelf llelf changed the base branch from develop-3.0 to develop-2.2 March 8, 2019 11:23
@llelf llelf changed the base branch from develop-2.2 to develop-2.9 March 8, 2019 11:23
@martincox
Copy link

LGTM 👍

@martincox martincox merged commit 0001bdf into basho:develop-2.9 Mar 8, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants