Whoops : error.asp page allows for user-supplied input

XMLWordPrintable

      Issue Summary

      • Any anonymous user is able to craft and supply a query string to the Whoops (error.asp) page
      • The error.asp page seems to ingest & process any payload sent (given the string is shown in the Whoops screen)

      Steps to Reproduce

      1. As an anonymous user, craft a query string like the example below:
        https://<instance>.jiraalign.com/error?d=<user-supplied input>
      2. By using Mozilla, browse to that URL
      • Notice the Whoops error message is displayed, containing the user-supplied string

      Expected Results

      Customer's Expected Behavior

      • Anonymous users should not be able to parse/inject any payload via any ASP page
      • Logged-in users should not be able to parse/inject any payload via https://<instance>.jiraalign.com/error?d=<user-supplied input>

      Actual Results

      • The user-supplied content is displayed in the Whoops page body:

      Workaround

      • Currently there is no known workaround for this behavior. A workaround will be added here when available

            Assignee:
            Kyle Foreman
            Reporter:
            Rodrigo Cortez
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

              Created:
              Updated:
              Resolved:

                Estimated:
                Original Estimate - Not Specified
                Not Specified
                Remaining:
                Remaining Estimate - 0h
                0h
                Logged:
                Time Spent - 1h
                1h