Forums

Articles
Create
cancel
Showing results for 
Search instead for 
Did you mean: 

A1 Injection issue reported by fortify tool

Ash March 4, 2019

Hello,

Need help to resolve A1 Injection issue reported by fortify tool.

Detail below:

The method load() in SummaryAction.java writes unvalidated user input
to the log on line 71. An attacker could take advantage of this behavior to forge log
entries or inject malicious content into the log.

SummaryAction.java:71 org.apache.log4j.Category.info()
69 SummaryForm sForm = (SummaryForm) form;
70 logger.info("[SummaryAction]=tNo="+txInfo.getTNumber());
71 logger.info("[SummaryAction]=AppNo="+txInfo.getAppNumber());

load method snippet from SummaryAction.java:

private void load(ActionMapping mapping,
ActionForm form,
HttpServletRequest request,
HttpServletResponse response, boolean isLoad) throws SystemException, ApplicationException
{
AbstractTransactionInfo txInfo = getTransactionInfo(request);
SummaryForm sForm = (SummaryForm) form;
logger.info("[SummaryAction]=tNo="+tInfo.getTxNumber());
logger.info("[SummaryAction]=AppNo="+tInfo.getAppNumber());

Please provide suitable solution. Thanks in advance. :) 

1 answer

1 accepted

0 votes
Answer accepted
Nic Brough -Adaptavist-
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
March 5, 2019

An attacker would have to be at least a Jira admin in order to inject the code needed to do this, and if they are an admin, there are far worse things they could do.

The solution is "don't allow admin access to malicious users"

Suggest an answer

Log in or Sign up to answer
TAGS
AUG Leaders

Atlassian Community Events