https://issues.apache.org/bugzilla/show_bug.cgi?id=50958

           Summary: ISAPI HTTP Response Splitting Vulnerability
           Product: Tomcat Connectors
           Version: 1.2.31
          Platform: PC
        OS/Version: Windows XP
            Status: NEW
          Severity: normal
          Priority: P2
         Component: isapi
        AssignedTo: dev@tomcat.apache.org
        ReportedBy: vkhle...@gmail.com


Created an attachment (id=26793)
 --> (https://issues.apache.org/bugzilla/attachment.cgi?id=26793)
Contains test WAR and ISAPI config files

The ISAPI plugin seems to be vulnerable to HTTP response splitting attacks. 

The plugin code doesn't filter CRLFs from response header values before the
response is sent to the client. Tomcat replaces CRLFs with spaces when accessed
directly through an HTTP connector. I suggest the ISAPI plugin does the same.

The test application in the attachment demonstrates the attack. It contains a
simple JSP that sets a special header value that breaks the HTTP response
structure. To run the test app, extract the attached zip file, deploy the WAR
to Tomcat, and use the included config files for the ISAPI plugin. Once done,
browse to http://localhost/response-splitting

If the message "Please enter password" with a text box is displayed, the
exploit has worked. Compare that to the response you get by browsing to Tomcat
directly (i.e. a blank page). 

The test app uses a hard-coded header value, but it's easy to imagine that the
value could come from an untrusted source, like a request parameter.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to