IWSVA RCE Enhancement

Protection for malicious code injection on web console

Background

ZDI exposed some remote code execution vulnerabilities claim (VC) before, these VC have been trim by adding
parameters inspection on every interface. But the left interfaces still suffers from similar vulnerabilities.
On some conditions, attacker can utilize this vulnerability to perform remote code execution.

IWSVA web console has no a common parameters inspection module to defend the malicious code injection.
Web console is based on tomcat server, tomcat provides filter mechiasm to inspection HTTP request before
delivering to servlets.

ParamsFilter Framework

Filter chain

Currently, web console has a filter chain with two filers (for authentication and CSRF). To inspect
all request parameters, ParamsFilter would be append on the filter chain.

HttpRequest ------>  AuthFilter ------> CSRFGuardFilter ------> ParamsFilter
|                    |                   |                    |
|         request -->| authentication -->| token validate --->| parameters inspection

Parameter filter

Steps for white & black list

Table of Contents