..; bypass leading to tomcat scripts [Unauthenticated]

Disclosed: 2020-10-13 09:26:31 By 1nc0gbyt3 To informatica
Medium
Vulnerability Details
Hello all Using the technique ..; i was able to bypass the protection mechanism to access Tomcat Example Scripts hosted at **https://███/**. ## Steps to reproduce 1 - Open all URL's bellow inside your browser [ https://█████████/..;/examples/servlets/servlet/SessionExample] | Will lead to Session Manipulation and potential Account Takeover. Because the session is global this servlet poses a big security risk as an attacker can potentially become an administrator by manipulating its session. [https://████████/..;/examples/servlets/servlet/CookieExample] | Insecure Cookie Handling [https://████████/..;/examples/servlets/] | Source Code Disclosure and an "Execute" option [https://███████/..;/examples/servlets/servlet/RequestHeaderExample] | Internal IP disclosure ## PoC i upload some images. ## Fixing Isolate backend application, Remove the management console and other servlet contexts and Check behaviors between proxy and backend servers. More info here, [https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf] --> Orange Tsai -- Blackhat talk -- thanks to him ## Impact Apache Tomcat default installation contains the "/examples" directory which has many example servlets and JSPs. Some of these examples are a security risk and should not be deployed on a production server. The Sessions Example servlet (installed at /examples/servlets/servlet/SessionExample) allows session manipulation. Because the session is global this servlet poses a big security risk as an attacker can potentially become an administrator by manipulating its session.
Actions
View on HackerOne
Report Stats
  • Report ID: 1004007
  • State: Closed
  • Substate: resolved
  • Upvotes: 26
Share this report