New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible SQL Injections with postgis TIME filters #4834

Closed
tbonfort opened this Issue Dec 31, 2013 · 0 comments

Comments

Projects
None yet
1 participant
@tbonfort
Member

tbonfort commented Dec 31, 2013

As part of @rouault 's WFS 2.0 work he discovered a SQL injection issue specific to WMS-Time and perhaps SOS services. It has to do with PostGIS and time validation. Based on Even's tests for WMS-Time the vulnerability is limited to unintended disclosure of data from the specific table, if specific conditions are met:

  • WMS-Time is configured
  • PostGIS is used
  • GetFeatureInfo output formats dump all attributes (e.g. gmlitems all)

Basically you can muck with the where clause but can’t execute secondary commands (e.g. delete …). It may be possible to access unintended data through the map itself (e.g. via a label item) but that seems pretty hard. Again, SOS services have not been examined.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment