Those headers don't come from GWT itself, they've been added by the 
application or some library/framework it uses on top of GWT. It looks like 
that app is using something like gwt-dispatch, gwt-sl or spring4gwt or 
something like that, but maybe homemade.
What I'd do to tell if they're actually used/useful (in this specific 
case!):

   1. open the WAR and look at the WEB-INF/web.xml (or possibly some other 
   configuration files if it uses, e.g., Spring or whatever) to try to find 
   the servlet class mapped to the /dispatch/GetCompaniesAction path (could be 
   as easy as a class named GetCompaniesAction)
   2. Decompile that class (using javap or an IDE) and look for a 
   doPut(ServletRequest,ServletResponse) method. Possibly go up the class 
   hierarchy until you find the RemoteServiceServlet.

Depending on the application, that may not lead to anything, but if there's 
a doPut, changes are it will be used.

Also look at the WEB-INF/web.xml for servlet filters, and at other 
configuration files (Spring mainly, if used) to see if there'd be some 
filter dedicated to handling those kind of headers.

Anyway, as said: this doesn't come from GWT itself.

(actually, I'd be more concerned about a Firefox 98 being used 😅)

Now I don't know Fortify WebInspect so maybe I'm also misinterpreting 
what's reported here: if this is a request made by Fortify WebInspect 
(rather than one made "on the wild" and intercepted by the solution) then I 
don't see why it'd be reported as a vulnerability, it could be that the 
server completely ignores the headers, right?

On Wednesday, April 26, 2023 at 11:37:00 AM UTC+2 cyclop...@gmail.com wrote:

> We have a web app (GWT 2.7 ) from a vendor and we don't have any source 
> codes.
> Now we faced a vulnerability about *HTTP Method Override* for http header 
> below
>
> *X-HTTP-METHOD*
>
> *X-HTTP-Method-Override*
> *X-METHOD-OVERRIDE*
>
> Fortify WebInspect report
>
> Attack Request:
> POST /CustomPortal/dispatch/GetCompaniesAction HTTP/1.1
> Host: 10.4.202.26:8861
> User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) 
> Gecko/20100101 Firefox/98.0
> Accept: */*
> Accept-Language: en-US,en;q=0.5
> Accept-Encoding: gzip, deflate
> Content-Type: text/x-gwt-rpc; charset=utf-8
> X-GWT-Permutation: 3EE8E625356CC9E9E724C10285609299
> X-GWT-Module-Base: https://10.4.202.26:8861/CustomPortal/custom/
> Referer: https://10.4.202.26:8861/CustomPortal/
> Content-Length: 311
> Origin: https://10.4.202.26:8861
> Pragma: no-cache
> X-HTTP-METHOD: PUT
> X-HTTP-Method-Override: PUT
> X-METHOD-OVERRIDE: PUT
> Connection: Keep-Alive
> X-WIPP: AscVersion=22.2.0....TRUNCATED...
>
> Attack Response:
> HTTP/1.1 200 OK
> Set-Cookie: JSESSIONIDSSO=; path=/; HttpOnly; Max-Age=0; Expires=Thu, 
> 01-Jan-1970 00:00:00 GMT
> X-XSS-Protection: 1; mode=block
> X-Frame-Options: SAMEORIGIN
> Referrer-Policy: strict-origin-when-cross-origin
> Content-Security-Policy: default-src 'self'; object-src 'none'; base-uri 
> 'none'; style-src 'self' 'unsafe-inline'; img-src 'self'; scriptsrc
> 'self' 'unsafe-inline' 'unsafe-eval';connect-src 'self' https: localhost;
> Content-Disposition: attachment
> Date: Fri, 21 Apr 2023 06:10:56 GMT
> Connection: keep-alive
> X-Content-Type-Options: nosniff
> Content-Length: 177
> Content-Type: application/json;charset=utf-8
> //EX[3,0,2,1,0,1,["com...TRUNCATED...
>
> Is there any way to disable these headers ?
> Or is there any description to let me tell user this is NOT vulnerability 
> ?
>
> AP server is JBoss EAP 7.3.8 GA
>
> Many thx!
>
>
>

-- 
You received this message because you are subscribed to the Google Groups "GWT 
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to google-web-toolkit+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/google-web-toolkit/71934569-0a42-4892-9354-c8f527c22830n%40googlegroups.com.

Reply via email to