Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
passtheticket authored Mar 25, 2024
1 parent a51f085 commit a44dac0
Showing 1 changed file with 2 additions and 6 deletions.
8 changes: 2 additions & 6 deletions cockpitProject/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,12 +4,8 @@
* OS: Ubuntu 18.04
* Page: login

User can detect open ssh port or another open ports on server that services Cockpit last version. This is a vulnerability that allows an user send request to internal hosts for detecting open ports. So that firewall configuration can be bypassed or the server can be used like gateway by malicious user for scanning process.
In addition, user induces the application to make an request back to the server that is hosting Cockpit.
For example: if system admin creates iptables rule to drop all packets that come to 22 port or another port, user can detect whether port 22 is open or not.

Assuming that there is a iptables rule which port 22 is open for 127.0.0.1 (loopback interface) but is closed for other interfaces.

An unauthenticated user can detect open ssh port or another open ports on server that services Cockpit last version. In addition, this vulnerability that allows a user sends request to internal hosts for detecting open ports so that firewall configuration can be bypassed or the server can be used like gateway by attacker user for scanning process. For example, if system admin creates iptables rule to drop all packets that come to 22 port or another port, user can detect whether port 22 is open or not.
Assuming that there is a rule which the port 22 is open for 127.0.0.1 (loopback interface) only .

```
First HTTP Request:
Expand Down

0 comments on commit a44dac0

Please sign in to comment.