Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Apache Tomcat Manager Path Normalization Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#tomcat#apache
Description

What is the "Apache Tomcat Manager Path Normalization Panel - Detect?"

The "Apache Tomcat Manager Path Normalization Panel - Detect" module is designed to detect a specific misconfiguration in the Apache Tomcat Manager Path Normalization login panel. This module targets the Apache Tomcat software and aims to identify potential vulnerabilities or misconfigurations related to the path normalization feature in the manager panel. The severity of this module is classified as informative, meaning it provides valuable information without directly exploiting any vulnerabilities. This module was created by an unknown author.

Impact

This module does not directly impact the target system. Instead, it helps identify potential vulnerabilities or misconfigurations in the Apache Tomcat Manager Path Normalization login panel. By detecting these issues, system administrators can take appropriate actions to secure their Apache Tomcat installations.

How the module works?

The "Apache Tomcat Manager Path Normalization Panel - Detect" module works by sending various HTTP requests to the target system's Apache Tomcat Manager Path Normalization login panel. These requests include different path variations, such as "/..;/manager/html" and "/..;/host-manager/html", to test for potential misconfigurations.

The module then applies matching conditions to the responses received from the target system. It checks for specific words, such as "username=\"tomcat\" password=\"s3cret\"" and "manager-gui", to identify if the login panel is displaying sensitive information or if it matches the expected behavior.

If the module detects a match, it will report the vulnerability or misconfiguration to the user. However, if the response status is 403 (Forbidden), it indicates that the login panel is properly secured, and no further action is required.

It's important to note that this module only detects potential issues and does not actively exploit any vulnerabilities.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/..;/manager/html/..;/..;/manager/htm.../..;/host-manager/ht...(+3 paths)
Matching conditions
word: username="tomcat" password="s3cret", man...and
NOT status: 403
Passive global matcher
No matching conditions.
On match action
Report vulnerability