Twenty Year Anniversary

Eclipse Vert.x 3.5.1 HTTP Header Injection

Eclipse Vert.x 3.5.1 HTTP Header Injection
Posted Jun 13, 2018
Authored by Lukasz D.

Eclipse Vert.x versions 3.0.0 through 3.5.1 suffer from an HTTP header injection vulnerability.

tags | exploit, web
MD5 | b0bcdd2957a82518f6bc91174e6bea0c

Eclipse Vert.x 3.5.1 HTTP Header Injection

Change Mirror Download
#############################################################
#
# COMPASS SECURITY ADVISORY
# https://www.compass-security.com/research/advisories/
#
#############################################################
#
# Product: Vert.x [1]
# CSNC ID: CSNC-2018-021
# Subject: HTTP Header Injection
# Risk: Medium
# Effect: Remotely exploitable
# Author: Lukasz D. (advisories@compass-security.com)
# Date: 12.06.2018
#
#############################################################

Introduction:
-------------
Eclipse Vert.x is a tool-kit for building reactive applications on the JVM.
Vert.x can be used for simple network utilities, sophisticated modern web
applications, HTTP/REST microservices, high volume event processing
or a full-blown back-end message-bus applications. Vert.x is used by many
different companies from real-time gaming to banking and everything in between.

Vert.x does not filter carriage return and line feed characters from values of
set HTTP response headers. This allows to manipulate values of the set HTTP
headers and to add arbitrary new headers. In particular, issuing a redirection
and manipulation of cookies set by the server is possible.

Affected:
---------
The following Vert.x versions are vulnerable:
- 3.0.0 - 3.5.1

Technical Description:
----------------------
The method putHeader(String name, String value) used to set new headers in the
HTTP response does not filter carriage return and line feed characters from
the header value. If a web application uses a user-provided parameter as
a value of the header, then it is possible for a user to add new HTTP headers
of his choice.

For example, a Vert.x-based web application may use the vulnerable method like
this: putHeader("User-Header", foo), where foo is the user-provided parameter.

Then:
Requesting /vulnerable?foo=bar will add a header: "User-Header: bar".
Requesting /vulnerable?foo=bar%0D%0ASet-Cookie:%20mycookie=hello will add
a header: "User-Header: bar" and additionally will set a new cookie
with name "mycookie" and value "hello".

Workaround / Fix:
-----------------
It needs to be ensured that every header value which is set based on
a user-provided parameter does not contain carriage return and line feed
characters.

Timeline:
---------
2018-02-22: Vulnerability discovered
2018-04-04: Initial vendor notification
2018-04-04: Initial vendor response
2018-06-04: Patched version released
2018-06-13: Public disclosure

References:
-----------
[1]: https://vertx.io/

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    29 Files
  • 14
    Nov 14th
    23 Files
  • 15
    Nov 15th
    45 Files
  • 16
    Nov 16th
    11 Files
  • 17
    Nov 17th
    1 Files
  • 18
    Nov 18th
    1 Files
  • 19
    Nov 19th
    3 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close