
22 changes to exploits/shellcodes/ghdb LISTSERV 17 - Insecure Direct Object Reference (IDOR) LISTSERV 17 - Reflected Cross Site Scripting (XSS) Router ZTE-H108NS - Stack Buffer Overflow (DoS) Router ZTE-H108NS - Authentication Bypass Boa Web Server v0.94.14 - Authentication Bypass Covenant v0.5 - Remote Code Execution (RCE) Dreamer CMS v4.0.0 - SQL Injection Shoplazza 1.1 - Stored Cross-Site Scripting (XSS) Virtual Reception v1.0 - Web Server Directory Traversal 4images 1.9 - Remote Command Execution (RCE) ClicShopping v3.402 - Cross-Site Scripting (XSS) Concrete5 CME v9.1.3 - Xpath injection Device Manager Express 7.8.20002.47752 - Remote Code Execution (RCE) Ecommerse v1.0 - Cross-Site Scripting (XSS) Eve-ng 5.0.1-13 - Stored Cross-Site Scripting (XSS) myBB forums 1.8.26 - Stored Cross-Site Scripting (XSS) WPForms 1.7.8 - Cross-Site Scripting (XSS) CrowdStrike Falcon AGENT 6.44.15806 - Uninstall without Installation Token Lavasoft web companion 4.1.0.409 - 'DCIservice' Unquoted Service Path Zillya Total Security 3.0.2367.0 - Local Privilege Escalation
75 lines
No EOL
2.3 KiB
Text
75 lines
No EOL
2.3 KiB
Text
# Exploit Title: Boa Web Server v0.94.14 - Authentication Bypass
|
|
#Date: 19-11-2022
|
|
# Exploit Author: George Tsimpidas
|
|
# Vendor: https://github.com/gpg/boa
|
|
# CVE: N/A
|
|
# Tested on: Debian 5.18.5
|
|
|
|
Description :
|
|
|
|
Boa Web Server Versions from 0.94.13 - 0.94.14 fail to validate the
|
|
correct security constraint on the HEAD http method allowing everyone
|
|
to bypass the Basic Authorization Mechanism.
|
|
|
|
Culprit :
|
|
|
|
if (!memcmp(req->logline, "GET ", 4))
|
|
req->method = M_GET;
|
|
else if (!memcmp(req->logline, "HEAD ", 5))
|
|
/* head is just get w/no body */
|
|
req->method = M_HEAD;
|
|
else if (!memcmp(req->logline, "POST ", 5))
|
|
req->method = M_POST;
|
|
else {
|
|
log_error_doc(req);
|
|
fprintf(stderr, "malformed request: \"%s\"\n", req->logline);
|
|
send_r_not_implemented(req);
|
|
return 0;
|
|
}
|
|
|
|
The req->method = M_HEAD; is being parsed directly on the response.c
|
|
file, looking at how the method is being implemented for one of the
|
|
response codes :
|
|
|
|
/* R_NOT_IMP: 505 */
|
|
void send_r_bad_version(request * req)
|
|
{
|
|
SQUASH_KA(req);
|
|
req->response_status = R_BAD_VERSION;
|
|
if (!req->simple) {
|
|
req_write(req, "HTTP/1.0 505 HTTP Version Not Supported\r\n");
|
|
print_http_headers(req);
|
|
req_write(req, "Content-Type: " HTML "\r\n\r\n"); /* terminate
|
|
header */
|
|
}
|
|
if (req->method != M_HEAD) {
|
|
req_write(req,
|
|
"<HTML><HEAD><TITLE>505 HTTP Version Not
|
|
Supported</TITLE></HEAD>\n"
|
|
"<BODY><H1>505 HTTP Version Not Supported</H1>\nHTTP
|
|
versions "
|
|
"other than 0.9 and 1.0 "
|
|
"are not supported in Boa.\n<p><p>Version encountered: ");
|
|
req_write(req, req->http_version);
|
|
req_write(req, "<p><p></BODY></HTML>\n");
|
|
}
|
|
req_flush(req);
|
|
}
|
|
|
|
|
|
Above code condition indicates that if (req->method != M_HEAD) therefore
|
|
if the the requested method does not equal to M_HEAD then
|
|
|
|
req_write(req,
|
|
"<HTML><HEAD><TITLE>505 HTTP Version Not
|
|
Supported</TITLE></HEAD>\n"
|
|
"<BODY><H1>505 HTTP Version Not Supported</H1>\nHTTP
|
|
versions "
|
|
"other than 0.9 and 1.0 "
|
|
"are not supported in Boa.\n<p><p>Version encountered: ");
|
|
req_write(req, req->http_version);
|
|
req_write(req, "<p><p></BODY></HTML>\n");
|
|
}
|
|
|
|
So if the method actually contains the http method of HEAD it's being
|
|
passed for every function that includes all the response code methods. |