If you do not need the feature and do not want to make an update, add the following line to <OpenNMS-Home>/jetty-webapps/opennms/WEB-INF/applicationContext-spring-security.xml
<!-- Workaround for --> <intercept-url pattern="/report/database/downloadReport.htm*" access="ROLE_NOACCESS" />
Benjamin Reed June 5, 2014 at 10:16 AM
You know it's a good bug when we release a fix to the previous stable release. Thanks for the catch!
Jeff Gehlbach June 3, 2014 at 2:54 PM
Fixed this exposure by comparing the pathname of the requested file's parent directory against the configured storage-location in reportd-configuration.xml. If no match, we throw an exception.
Fix committed and pushed in 1.12, cherry-picked to 1.10, and merged to master (1.13).
Walkthrough:
Login to OpenNMS Webui
paste following URL in browser:
http://<IP-OF-OPENNMS>:8980/opennms/report/database/downloadReport.htm?fileName=/etc/group
Or another file in filesystem.
It should be suppressed to access files outside defined paths.