-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Request] - Add check for unencoded URI Path #3
Comments
Correct me if I'm wrong, but I remember this being a limitation of Burp's Scanner (as it decides the encoding, and we can't really control it from an ext)? As a workaround you can use Hackvertor and Intruder defined insertion points. |
Oh, you know what you're probably right. I hadn't considered that. I have ways around it that we're already using, but I was hoping to rely on the plugin for automated detection by using some custom tools to feed requests into Burp and using a Live task to scan them all. That still is valuable, but we know that it won't be 100%. |
The main issue is how the Burp scanner works: identifying insertion points ( So for your problem, the nice solution would be such an
That being said, based on #1, the good question is whether such an insertion point provider
|
I would say this could be a nice, standalone extension that other scanners can rely on too, but should not be the scope of this one. The ticket is useful to highlight such edge cases though, thanks for reporting! |
Agreed. This does seem like a wider need and not specific to the Log4J vulnerability. It may be worth mentioning in the README that, at this time, there may be some edge cases that require manual/outside the plugin testing to confirm true negative states in terms of vulnerability to the issue. |
Helpful description here. Not only did I learn something about the API, I also learned that the Intruder UI allows control over auditing insertion points from a note in the Burp Intruder docs : This might be worth mentioning in the README? |
Glad to hear 🎉
That's why @v-p-b wrote this above (emphasis mine):
I'll think about how to mention this in the README |
In my internal environment testing we've found some hosts/products that have been vulnerable to the Log4J vulnerability but where it would only fire if the URI path was NOT URL encoded. These hosts are not showing any vulnerable parameters when scanned using the plugin but will fire if I take the payload, un-encode it, and replay it in Repeater. When we check the logs generated, we found that it is logging the raw URI and this was causing the payload to not be interpreted by the vulnerable class. In these hosts, only the URI was vulnerable so the other non-encoded positions such as User-Agent were not being processed.
Thanks for putting this out, BTW!
The text was updated successfully, but these errors were encountered: