Loading HuntDB...

..; bypass leading to tomcat scripts [Unauthenticated]

Medium
I
Informatica
Submitted None

Team Summary

Official summary from Informatica

Security researcher identified that Tomcat example/test scripts that are default were still accessible in a test environment/system. Access was restricted and hardening applied as the standard to any production/data handling system would define.

Reported by rodntt

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
Hello all Using the technique ..; i was able to bypass the protection mechanism to access Tomcat Example Scripts hosted at **https://███/**. ## Steps to reproduce 1 - Open all URL's bellow inside your browser [ https://█████████/..;/examples/servlets/servlet/SessionExample] | Will lead to Session Manipulation and potential Account Takeover. Because the session is global this servlet poses a big security risk as an attacker can potentially become an administrator by manipulating its session. [https://████████/..;/examples/servlets/servlet/CookieExample] | Insecure Cookie Handling [https://████████/..;/examples/servlets/] | Source Code Disclosure and an "Execute" option [https://███████/..;/examples/servlets/servlet/RequestHeaderExample] | Internal IP disclosure ## PoC i upload some images. ## Fixing Isolate backend application, Remove the management console and other servlet contexts and Check behaviors between proxy and backend servers. More info here, [https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf] --> Orange Tsai -- Blackhat talk -- thanks to him ## Impact Apache Tomcat default installation contains the "/examples" directory which has many example servlets and JSPs. Some of these examples are a security risk and should not be deployed on a production server. The Sessions Example servlet (installed at /examples/servlets/servlet/SessionExample) allows session manipulation. Because the session is global this servlet poses a big security risk as an attacker can potentially become an administrator by manipulating its session.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Access Control - Generic