SoftTree Technologies SoftTree Technologies
Technical Support Forums
RegisterSearchFAQMemberlistUsergroupsLog in
Help resolving vulnerability

 
Reply to topic    SoftTree Technologies Forum Index » 24x7 Scheduler, Event Server, Automation Suite View previous topic
View next topic
Help resolving vulnerability
Author Message
Eric.Charbonneau



Joined: 03 Nov 2016
Posts: 31
Country: United States

Post Help resolving vulnerability Reply with quote
I could use some help resolving this vulnerability

Vulnerability, TEN-47831: The remote web server hosts CGI scripts that fail to adequately sanitize request strings of malicious JavaScript. By leveraging this The remote web server hosts CGI scripts that fail to adequately sanitize request strings of malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site. These XSS are likely to be 'non-persistent' or 'reflected'.

Using the GET HTTP method, Nessus found that : + The following resources may be vulnerable to cross-site scripting (comprehensive test) : + The 'server' parameter of the /login_proceed.jsp CGI : /login_proceed.jsp?login=&password=&sched_type=jscheduler&server=%FF%FE% 3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%32%30%33%29%3C%2F%73%63%72%69% 70%74%3E -------- output -------- <tr> <td><font><strong>Unable to connec t to ??<script>alert(203)</script> on port 1097. Verify that the server name is correct, the 24x7 server is configured for remote control, and t he firewall isn't blocking connections on that port</strong></font></td> </tr> ------------------------


any idea what to add to the web.xml in order to resolve this?


Thank you
Thu Feb 20, 2025 12:12 pm View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 7942

Post Reply with quote
Thank you for sharing it. Investigating...
Thu Feb 20, 2025 1:43 pm View user's profile Send private message
Eric.Charbonneau



Joined: 03 Nov 2016
Posts: 31
Country: United States

Post Reply with quote
SysOp wrote:
Thank you for sharing it. Investigating...


Hi There have you had a chance to look into this?


Thank You
Tue Feb 25, 2025 11:56 am View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 7942

Post Reply with quote
The investigation is still ongoing. I might be able to provide some preliminary results very soon
Tue Feb 25, 2025 5:14 pm View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 7942

Post Reply with quote
The preliminary result that report is a false positive. In a nutshell it says that an attacker might be able to use "server" parameter for cross-site scripting. That might be the case if the server value was used in a web context. Quoting it here "an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site."

That's not the case here, the server value isn't used in a web context. It's used as is, as a name of the server running 24x7 Scheduler, basically an end-point to which the console is going to try to connect to using non-web based protocol. Your DNS server will try to resolve that name to a TCP/IP address, there is no HTML or script interpretation from the given value and no redirection or cross-site references of any sort. The value isn't passed to any other web page too, sort of a one way street.
Tue Feb 25, 2025 5:49 pm View user's profile Send private message
Eric.Charbonneau



Joined: 03 Nov 2016
Posts: 31
Country: United States

Post Reply with quote
SysOp wrote:
The preliminary result that report is a false positive. In a nutshell it says that an attacker might be able to use "server" parameter for cross-site scripting. That might be the case if the server value was used in a web context. Quoting it here "an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site."

That's not the case here, the server value isn't used in a web context. It's used as is, as a name of the server running 24x7 Scheduler, basically an end-point to which the console is going to try to connect to using non-web based protocol. Your DNS server will try to resolve that name to a TCP/IP address, there is no HTML or script interpretation from the given value and no redirection or cross-site references of any sort. The value isn't passed to any other web page too, sort of a one way street.


I have a question from my colleague if you wouldn't mind taking a look.

Thank you

"Just to understand what they mean, they are saying the server itself isn't parsing the commands we are sending to the webpage? Are they saying since it is a server basically running an application the server is sending the commands itself to the application and not the web portion of the site?"
Wed Feb 26, 2025 11:49 am View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 7942

Post Reply with quote
Please disregard the above preliminary results. It has been confirmed that the vulnerability report is correct. The results can be reproduced with older versions of the Web Console. The initial test was performed with the latest 7.5 release.

How to resolve it:
Option 1: Upgrade web server to the latest version of Apache Tomcat 9.x release branch. Here is a link to the download page https://tomcat.apache.org/download-90.cgi
Get .zip or .tar.zip file, and extract it to the current installation, for example (c:\home\WebConsole or /home/24x7/WebConcole)

Option 2: Version 7.5 is supposed to be released next week. Upgrade to that version. Allow setup to upgrade the existing Web Console, that will upgrade Tomcat to 9.0.98 release


After upgrade the vulnerability test should result in a page error with org.apache.jasper.JasperException exception, which is ok. It won't let the bad value in the server parameter to pass through, and that would cause an error downstream, which is expected.
Thu Feb 27, 2025 9:37 am View user's profile Send private message
Eric.Charbonneau



Joined: 03 Nov 2016
Posts: 31
Country: United States

Post Reply with quote
SysOp wrote:
Please disregard the above preliminary results. It has been confirmed that the vulnerability report is correct. The results can be reproduced with older versions of the Web Console. The initial test was performed with the latest 7.5 release.

How to resolve it:
Option 1: Upgrade web server to the latest version of Apache Tomcat 9.x release branch. Here is a link to the download page https://tomcat.apache.org/download-90.cgi
Get .zip or .tar.zip file, and extract it to the current installation, for example (c:\home\WebConsole or /home/24x7/WebConcole)

Option 2: Version 7.5 is supposed to be released next week. Upgrade to that version. Allow setup to upgrade the existing Web Console, that will upgrade Tomcat to 9.0.98 release


After upgrade the vulnerability test should result in a page error with org.apache.jasper.JasperException exception, which is ok. It won't let the bad value in the server parameter to pass through, and that would cause an error downstream, which is expected.


I think I will just wait for the new release. It would be good to know how to upgrade just the tomcat though. is it jsut a matter of unzipping the files and placing them into the webconsole folder? or is there more to it.
Thu Feb 27, 2025 9:54 am View user's profile Send private message
SysOp
Site Admin


Joined: 26 Nov 2006
Posts: 7942

Post Reply with quote
Backup files, stop service, unzip, restart service should be sufficient. If anything, restore files from backup (step 1)
Thu Feb 27, 2025 1:35 pm View user's profile Send private message
Eric.Charbonneau



Joined: 03 Nov 2016
Posts: 31
Country: United States

Post Reply with quote
SysOp wrote:
Backup files, stop service, unzip, restart service should be sufficient. If anything, restore files from backup (step 1)


I just tried that and migrated the server and web.xml files over and when i go to the URL i get the Apache 9.0.100 welcome page "If you're seeing this, you've successfully installed Tomcat. Congratulations!"
Thu Feb 27, 2025 3:02 pm View user's profile Send private message
Eric.Charbonneau



Joined: 03 Nov 2016
Posts: 31
Country: United States

Post Reply with quote
SysOp wrote:
Please disregard the above preliminary results. It has been confirmed that the vulnerability report is correct. The results can be reproduced with older versions of the Web Console. The initial test was performed with the latest 7.5 release.

How to resolve it:
Option 1: Upgrade web server to the latest version of Apache Tomcat 9.x release branch. Here is a link to the download page https://tomcat.apache.org/download-90.cgi
Get .zip or .tar.zip file, and extract it to the current installation, for example (c:\home\WebConsole or /home/24x7/WebConcole)

Option 2: Version 7.5 is supposed to be released next week. Upgrade to that version. Allow setup to upgrade the existing Web Console, that will upgrade Tomcat to 9.0.98 release


After upgrade the vulnerability test should result in a page error with org.apache.jasper.JasperException exception, which is ok. It won't let the bad value in the server parameter to pass through, and that would cause an error downstream, which is expected.


I am still getting flagged for this vulnerability on v7.5.

Thank you
Wed Mar 12, 2025 1:55 pm View user's profile Send private message
Display posts from previous:    
Reply to topic    SoftTree Technologies Forum Index » 24x7 Scheduler, Event Server, Automation Suite All times are GMT - 4 Hours
Page 1 of 1

 
Jump to: 
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


 

 

Powered by phpBB © 2001, 2005 phpBB Group
Design by Freestyle XL / Flowers Online.