In Eclipse BIRT versions 4.8.0 and earlier, an attacker can use query parameters to create a JSP file which is accessible from remote (current BIRT viewer dir) to inject JSP code into the running instance.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142 | issue tracking patch vendor advisory exploit |
http://seclists.org/fulldisclosure/2022/Dec/30 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/170326/Eclipse-Business-Intelligence-Reporting-Tool-4.11.0-Remote-Code-Execution.html | third party advisory exploit |