..; bypass leading to tomcat scripts [Unauthenticated]
Medium
I
Informatica
Submitted None
Team Summary
Official summary from Informatica
Security researcher identified that Tomcat example/test scripts that are default were still accessible in a test environment/system. Access was restricted and hardening applied as the standard to any production/data handling system would define.
Actions:
Reported by
rodntt
Vulnerability Details
Technical details and impact analysis
Hello all
Using the technique ..; i was able to bypass the protection mechanism to access Tomcat Example Scripts hosted at **https://███/**.
## Steps to reproduce
1 - Open all URL's bellow inside your browser
[ https://█████████/..;/examples/servlets/servlet/SessionExample] | Will lead to Session Manipulation and potential Account Takeover. Because the session is global this servlet poses a big security risk as an attacker can potentially become an administrator by manipulating its session.
[https://████████/..;/examples/servlets/servlet/CookieExample] | Insecure Cookie Handling
[https://████████/..;/examples/servlets/] | Source Code Disclosure and an "Execute" option
[https://███████/..;/examples/servlets/servlet/RequestHeaderExample] | Internal IP disclosure
## PoC
i upload some images.
## Fixing
Isolate backend application, Remove the management console and other servlet contexts and Check behaviors between proxy and backend servers.
More info here, [https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf] --> Orange Tsai -- Blackhat talk -- thanks to him
## Impact
Apache Tomcat default installation contains the "/examples" directory which has many example servlets and JSPs. Some of these examples are a security risk and should not be deployed on a production server.
The Sessions Example servlet (installed at /examples/servlets/servlet/SessionExample) allows session manipulation. Because the session is global this servlet poses a big security risk as an attacker can potentially become an administrator by manipulating its session.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Access Control - Generic