https://issues.apache.org/bugzilla/show_bug.cgi?id=50958
Summary: ISAPI HTTP Response Splitting Vulnerability
Product: Tomcat Connectors
Version: 1.2.31
Platform: PC
OS/Version: Windows XP
Status: NEW
Severity: normal
Priority: P2
Component: isapi
AssignedTo: [email protected]
ReportedBy: [email protected]
Created an attachment (id=26793)
--> (https://issues.apache.org/bugzilla/attachment.cgi?id=26793)
Contains test WAR and ISAPI config files
The ISAPI plugin seems to be vulnerable to HTTP response splitting attacks.
The plugin code doesn't filter CRLFs from response header values before the
response is sent to the client. Tomcat replaces CRLFs with spaces when accessed
directly through an HTTP connector. I suggest the ISAPI plugin does the same.
The test application in the attachment demonstrates the attack. It contains a
simple JSP that sets a special header value that breaks the HTTP response
structure. To run the test app, extract the attached zip file, deploy the WAR
to Tomcat, and use the included config files for the ISAPI plugin. Once done,
browse to http://localhost/response-splitting
If the message "Please enter password" with a text box is displayed, the
exploit has worked. Compare that to the response you get by browsing to Tomcat
directly (i.e. a blank page).
The test app uses a hard-coded header value, but it's easy to imagine that the
value could come from an untrusted source, like a request parameter.
--
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]