Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Spring security deployed app on AWS ThinkPHP request

I Have a spring boot app running on AWS. From time to time I see a log that pops out saying and mentioning ThinkPHP?

java.lang.IllegalArgumentException: Invalid character found in the request target [/index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars[0]=md5&vars[1][]=HelloThinkPHP21]. 
The valid characters are defined in RFC 7230 and RFC 3986.
at org.apache.coyote.http11.Http11InputBuffer.parseRequestLine(Http11InputBuffer.java:491) ~[tomcat-embed-core-9.0.36.jar!/:9.0.36]

And below:

org.springframework.security.web.firewall.RequestRejectedException: The request was rejected because the URL contained a potentially malicious String ";"
at org.springframework.security.web.firewall.StrictHttpFirewall.rejectedBlacklistedUrls(StrictHttpFirewall.java:369) ~[spring-security-web-5.3.3.RELEASE.jar!/:5.3.3.RELEASE]

Is this a reason for concern or what's happening? There's generally no traffic happening at all - no requests incoming to the server, yet this pops out.

like image 808
Ognjen Mišić Avatar asked Nov 08 '20 09:11

Ognjen Mišić


People also ask

How do I add Spring Security dependency in POM XML?

For adding a Spring Boot Security to your Spring Boot application, we need to add the Spring Boot Starter Security dependency in our build configuration file. Maven users can add the following dependency in the pom. xml file. Gradle users can add the following dependency in the build.


Video Answer


1 Answers

ThinkPHP is a web application development framework which has had various vulnerabilities over the years.

Your application is the target of spray and pray vulnerability scanners. You may find web server or application log entries with requests such as the following:

GET /index.php?s=/Index/\x5Cthink\x5Capp/invokefunction&function=call_user_func_array&vars[0]=md5&vars[1][]=HelloThinkPHP21 HTTP/1.1

As to whether you should be worried or not: it's really a question of what you are running and how well you are keeping up to date with your specific security requirements. Automated scanners are unlikely to find vulnerabilities for software you don't run.

like image 145
ShellingWeb Avatar answered Nov 15 '22 00:11

ShellingWeb