-
Notifications
You must be signed in to change notification settings - Fork 38.7k
Closed
Labels
in: webIssues in web modules (web, webmvc, webflux, websocket)Issues in web modules (web, webmvc, webflux, websocket)status: backportedAn issue that has been backported to maintenance branchesAn issue that has been backported to maintenance branchestype: bugA general bugA general bug
Milestone
Description
Darius Bohni opened SPR-11591 and commented
There is an security issue on line 843/844. An attacker can manipulate the log via malicious request.
The method doService extracts the URI from the request and uses it unvalidated.
Source:
logger.debug("DispatcherServlet with name '" + getServletName() + "'" + resumed +
" processing " + request.getMethod() + " request for [" + requestUri + "]");
An attacker can forge the log by sending a request containing %0D%0A
Like: /app/home%0D%0AFAKE
The log will looks like:
08:34:50.145 [http-bio-8080-exec-1] DEBUG o.s.web.servlet.DispatcherServlet - DispatcherServlet with name 'dispatcher' processing GET request for [/app/home
FAKE]
Affects: 3.2.8, 4.0.2
Referenced from: commits a2bdc28, 465ca24
Backported to: 3.2.9
Metadata
Metadata
Assignees
Labels
in: webIssues in web modules (web, webmvc, webflux, websocket)Issues in web modules (web, webmvc, webflux, websocket)status: backportedAn issue that has been backported to maintenance branchesAn issue that has been backported to maintenance branchestype: bugA general bugA general bug