Uploaded image for project: 'Jira Align'
  1. Jira Align
  2. JIRAALIGN-3587

Whoops : error.asp page allows for user-supplied input

    XMLWordPrintable

Details

    • Severity 3 - Minor
    • No

    Description

      Issue Summary

      • Any anonymous user is able to craft and supply a query string to the Whoops (error.asp) page
      • The error.asp page seems to ingest & process any payload sent (given the string is shown in the Whoops screen)

      Steps to Reproduce

      1. As an anonymous user, craft a query string like the example below:
        https://<instance>.jiraalign.com/error?d=<user-supplied input>
      2. By using Mozilla, browse to that URL
      • Notice the Whoops error message is displayed, containing the user-supplied string

      Expected Results

      Customer's Expected Behavior

      • Anonymous users should not be able to parse/inject any payload via any ASP page
      • Logged-in users should not be able to parse/inject any payload via https://<instance>.jiraalign.com/error?d=<user-supplied input>

      Actual Results

      • The user-supplied content is displayed in the Whoops page body:

      Workaround

      • Currently there is no known workaround for this behavior. A workaround will be added here when available

      Attachments

        Issue Links

          Activity

            People

              kforeman@atlassian.com Kyle Foreman
              rcortez@atlassian.com Rodrigo Cortez
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved:

                Time Tracking

                  Estimated:
                  Original Estimate - Not Specified
                  Not Specified
                  Remaining:
                  Remaining Estimate - 0h
                  0h
                  Logged:
                  Time Spent - 1h
                  1h

                  Backbone Issue Sync