exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Apache Axis 1.5 Session Fixation

Apache Axis 1.5 Session Fixation
Posted Jun 25, 2010
Authored by Leandro Oliveira, Tiago Ferreira

Apache Axis versions 1.5 and below suffer from a session fixation vulnerability.

tags | exploit
SHA-256 | e8ac4786c1ee2cd8e132577dbe3ed809421efacae3ea413f9efaf2c5f418ca4e

Apache Axis 1.5 Session Fixation

Change Mirror Download
=====[ Tempest Security Intelligence - Advisory #02 / 2010 ]===========


Vulnerability => [ 'Apache Axis Session Fixation Vulnerability' ]

Authors => ['Tiago Ferreira <tiago *SPAM* tempest.com.br>'
'Leandro Oliveira <leandro *SPAM* tempest.com.br>' ]


========[ Table of Contents ]===========================================

1. Overview
2. Detailed description
3. Other contexts & Solutions
4. Thanks
5. References


========[ Overview ]============================================================


* System affected => [ 'Apache Axis <= 1.5' ]
* Release date: => [ '24 June 2010' ]
* Impact => [ 'Successful exploitation of this
vulnerability may lead to remote administrative interface to accept a
Session Hijacking' ]


Axis2 [1] claims to be a Web Services / SOAP / WSDL engine, the
successor to the widely used Apache Axis SOAP stack. Nowadays, there are
two implementations of the Apache Axis2 Web services engine - Apache
Axis2/Java and Apache Axis2/C.

We have found a Session Fixation Vulnerability [2][3] in Apache Axis2.
When successfully exploited, this vulnerability allows to fixate a
Session Cookie in the browser of the victim, this way it's possible to
perform session hijacking attacks.

The chances of achieving success increases when the application is
vulnerable to Cross Site Scripting or HTTP Header Injection.


=====[ Detailed description ]===========================================

The vulnerability was found in the administrative interface of Axis2. By
default, it is accessible at the path /axis2/axis2-admin. To exploit
this flaw, we used a Cross Site Script in existing
Axis2 (http://www.exploit-db.com/exploits/12721/).


Code Snippet:

http://example:8080/axis2/axis2-admin/engagingglobally?submit=%2bEngage
2b&modules=<script>document.cookie="JSESSIONID=C958373831119190D2DC7838BA177980.tomcat1;
Path=/axis2";document.location="http://example:8080/axis2/axis2-admin/"</script>

The above code when run on the victim's browser, fixates the session
cookie sent by the attacker to it.


=====[ Other contexts & Solutions ]=====================================

As usual, we contacted the Apache Team [4]. Until this date there is no
known fix to solve this flaw.


========[ Thanks ]=====================================================

- Tempest Security Intelligence [5] - Pentest Team
- Evandro Curvelo Hora - evandro *SPAM* tempest.com.br


========[ References ]=================================================

[1] http://ws.apache.org/axis2/
[2] http://projects.webappsec.org/Session-Fixation
[3]
http://www.owasp.org/index.php/Testing_for_Session_Fixation_(OWASP-SM-003)
[4] https://issues.apache.org/jira/browse/AXIS2-4739
[5] http://www.tempest.com.br

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close