Forwarded from UNDERCODE TESTING
🔵Apache Ambari arbitrary file download vulnerability :
(DC: 278-2021)
https://dailycve.com/apache-ambari-arbitrary-file-download-vulnerability
(DC: 278-2021)
https://dailycve.com/apache-ambari-arbitrary-file-download-vulnerability
UNDERCODE TESTING
🔵Apache Ambari arbitrary file download vulnerability : (DC: 278-2021) https://dailycve.com/apache-ambari-arbitrary-file-download-vulnerability
Such exploit methods can be useful for pentesting other platforms
This vulnerability is mainly due to the use of "String requestURI =
httpRequest.getRequestURI();" in the authentication filter
(org.apache.ambari.server.security.authorization.AmbariAuthorizationFilter):
@Overridepublic void doFilter(ServletRequest request, ServletResponse response,
FilterChain chain) throws IOException, ServletException {
HttpServletRequest httpRequest = (HttpServletRequest) request;
HttpServletResponse httpResponse = (HttpServletResponse) response;
String requestURI = httpRequest.getRequestURI();
SecurityContext context = getSecurityContext();
Authentication authentication = context.getAuthentication();
AuditEvent auditEvent = null;
....
}
Because when the web server processes the request, when accessing a
path like "/everyone-has-permission-path/..;/admin-has-permission-path",
the web server will return the resource "admin-has-permission- path",
but "httpRequest.getRequestURI()" in the filter will return the path
"/everyone-has-permission-path/..;/admin-has-permission-path", so in
the following code Will result in permission to pass the match:
@Override
public void doFilter(ServletRequest request, ServletResponse
response, FilterChain chain) throws IOException, ServletException {
...
if (authentication == null || authentication instanceof
AnonymousAuthenticationToken) {
...
}
if (authentication == null || authentication instanceof
AnonymousAuthenticationToken ||
!authentication.isAuthenticated()) {
...
} else if (!authorizationPerformedInternally(requestURI)) {
boolean authorized = false;
if (requestURI.matches(API_BOOTSTRAP_PATTERN_ALL)) {
authorized = AuthorizationHelper.isAuthorized(authentication,
ResourceType.CLUSTER,
null,
EnumSet.of(RoleAuthorization.HOST_ADD_DELETE_HOSTS));
}
else {
...
}
...
}
...
}
In fact, when I need to access the api under "/users.*", I only need
to use "/bootstrap/..;/users" to bypass certain authentication checks.
Of course, the APIs under "users.*" may require certain permissions to
access, but this is just an example, which means that in this way, you
will be able to bypass the authentication check to access other APIs
that require authentication to access.
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
This vulnerability is mainly due to the use of "String requestURI =
httpRequest.getRequestURI();" in the authentication filter
(org.apache.ambari.server.security.authorization.AmbariAuthorizationFilter):
@Overridepublic void doFilter(ServletRequest request, ServletResponse response,
FilterChain chain) throws IOException, ServletException {
HttpServletRequest httpRequest = (HttpServletRequest) request;
HttpServletResponse httpResponse = (HttpServletResponse) response;
String requestURI = httpRequest.getRequestURI();
SecurityContext context = getSecurityContext();
Authentication authentication = context.getAuthentication();
AuditEvent auditEvent = null;
....
}
Because when the web server processes the request, when accessing a
path like "/everyone-has-permission-path/..;/admin-has-permission-path",
the web server will return the resource "admin-has-permission- path",
but "httpRequest.getRequestURI()" in the filter will return the path
"/everyone-has-permission-path/..;/admin-has-permission-path", so in
the following code Will result in permission to pass the match:
@Override
public void doFilter(ServletRequest request, ServletResponse
response, FilterChain chain) throws IOException, ServletException {
...
if (authentication == null || authentication instanceof
AnonymousAuthenticationToken) {
...
}
if (authentication == null || authentication instanceof
AnonymousAuthenticationToken ||
!authentication.isAuthenticated()) {
...
} else if (!authorizationPerformedInternally(requestURI)) {
boolean authorized = false;
if (requestURI.matches(API_BOOTSTRAP_PATTERN_ALL)) {
authorized = AuthorizationHelper.isAuthorized(authentication,
ResourceType.CLUSTER,
null,
EnumSet.of(RoleAuthorization.HOST_ADD_DELETE_HOSTS));
}
else {
...
}
...
}
...
}
In fact, when I need to access the api under "/users.*", I only need
to use "/bootstrap/..;/users" to bypass certain authentication checks.
Of course, the APIs under "users.*" may require certain permissions to
access, but this is just an example, which means that in this way, you
will be able to bypass the authentication check to access other APIs
that require authentication to access.
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from DailyCVE
🔵Utimaco SecurityServer security vulnerabilities:
(DC: 279-2021)
https://dailycve.com/utimaco-securityserver-security-vulnerabilities
(DC: 279-2021)
https://dailycve.com/utimaco-securityserver-security-vulnerabilities
Forwarded from DailyCVE
🔵Johnson Controls exacqVision: Access privileged data - Remote/unauthenticated:
(DC: 280-2021)
https://dailycve.com/johnson-controls-exacqvision-access-privileged-data-remoteunauthenticated
(DC: 280-2021)
https://dailycve.com/johnson-controls-exacqvision-access-privileged-data-remoteunauthenticated
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
On the 23rd, OnePlus teases the arrival of game trigger attachments with the OnePlus 9R 5G.
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
Forwarded from DailyCVE
🔵Vscode-shellcheck security vulnerability:
(DC: 281-2021)
https://dailycve.com/vscode-shellcheck-security-vulnerability
(DC: 281-2021)
https://dailycve.com/vscode-shellcheck-security-vulnerability
Forwarded from DailyCVE
🔵Vulnerability in Service Operation Interference (DoS) in Fuji Xerox MFPs and Printers:
(DC: 282-2021)
https://dailycve.com/vulnerability-service-operation-interference-dos-fuji-xerox-mfps-and-printers
(DC: 282-2021)
https://dailycve.com/vulnerability-service-operation-interference-dos-fuji-xerox-mfps-and-printers
Forwarded from UNDERCODE TESTING
🔵Grafana security vulnerabilities:
(DC: 283-2021)
https://dailycve.com/grafana-security-vulnerabilities
(DC: 283-2021)
https://dailycve.com/grafana-security-vulnerabilities
Forwarded from UNDERCODE TESTING
🔵Drupal bug in Varbase Layout Builder module:
(DC: 284-2021)
https://dailycve.com/drupal-bug-varbase-layout-builder-module
(DC: 284-2021)
https://dailycve.com/drupal-bug-varbase-layout-builder-module
Forwarded from UNDERCODE NEWS
Is the HomePod, which hasn't sold well, still the dumbest smart speaker?
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
Ethical Hacking for beginners 4.6 Rating -free udemy :
https://www.udemy.com/course/ethical-hacking-beginners/
1hr 52min of on-demand video
https://www.udemy.com/course/ethical-hacking-beginners/
1hr 52min of on-demand video
Udemy
Ethical Hacking for beginners| الهكر الأخلاقي للمبتدئين
تعلم أساسيات اختبار الإختراق ، والخطوات الأساسية لعملية الإختراق، والأدوات المهمة
Forwarded from UNDERCODE NEWS
Xiaomi is bringing a smartphone to Russia that can be broken in half with your hands.
#International
#International
Forwarded from UNDERCODE NEWS
Cheap $ 70 imported smartphone directly from India, search for the optimal solution with cheapness and practicality.
#Technologies
#Technologies
Forwarded from DailyCVE
🔵New wordpress unpatched bug : (Discovered since 2 hours)
(DC: 285-2021)
https://dailycve.com/new-wordpress-unpatched-bug
(DC: 285-2021)
https://dailycve.com/new-wordpress-unpatched-bug
Forwarded from DailyCVE
🔵Unpatched wordpress Gutenberg Plugin bug: (Discovered since 20 hours)
(DC: 286-2021)
https://github.com/WordPress/gutenberg/issues/30055
(DC: 286-2021)
https://github.com/WordPress/gutenberg/issues/30055
GitHub
Site Editor / iframe: Occasional double scrollbar. · Issue #30055 · WordPress/gutenberg
Description When using the site editor, you will occasionally see a double scrollbar. The scrollbar appears to be caused by the sibling inserter being positioned outside of the iframe, but below th...