Loading HuntDB...

burp does not validate the common name of the presented collaborator server certificate

Medium
P
PortSwigger Web Security
Submitted None
Reported by morisson

Vulnerability Details

Technical details and impact analysis

Man-in-the-Middle
Burp is not validating correctly if the presented certificate in collaborator server. It warns if it is a self signed one, but if it is a legitimate one (any valid CA), it appears not to be checking the CN. This is an issue for the polling service, since it allows for the connection to be intercepted and burp will happily send through the polling request. For PoC, just use a valid certificate for a completely different domain than the one used on the burp collaborator server, and connect to it. All checks will be ok, and when polling the server (using the scanner for instance), there's no warning or failure, and burp connects. I haven't extensively tested all possible options, but using a valid wildcard certificate from a totally different domain works. (note: there's also the functional bug of burp stating the connections are ok, but the target being tested will then fail to connect to any TLS service on the collaborator) ## Impact If the attacker is able to perform a MITM on the tester (either adjacent to him, or to the collaborator server, or somewhere along the path), he will be able to intercept the HTTPS polling connection to the collaborator server, and potentially obtain the records.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Man-in-the-Middle