Mockoon Path Traversal Scanner

Detects 'Path Traversal' vulnerability in Mockoon affects v. <= 9.1.0. This scanner identifies improper file access that could be exploited to access restricted files and directories.

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

16 days 10 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Mockoon is an easy-to-use and customizable mock API tool used by developers to simulate API endpoints. It's widely utilized for testing API functionalities without connecting to live servers. Mockoon assists developers in creating scenarios to test different responses and error messages. The software is embraced in local and staged environments, providing a safe testing playground. It supports various HTTP methods commonly used in RESTful APIs. Due to its widespread usage, vulnerabilities in Mockoon must be urgently addressed to prevent unauthorized data access.

Path Traversal vulnerabilities occur when an application accepts untrusted input to access files on the server. It can potentially allow attackers to navigate outside of the intended directory and access sensitive files. The vulnerability exploits the server's unsafe file handling procedures. Attackers can manipulate file paths and extract files from directories usually blocked due to permission settings. This defect compromises the server’s security, facilitating unauthorized access to confidential data.

The vulnerability in Mockoon <= 9.1.0 is tied to the way filenames are generated from user input. Attackers can execute a crafted request to access files outside the intended directory, including sensitive files like /etc/passwd. The attack involves providing a sequence of directory traversal characters such as '../', decoded to break out of the allowed directories. Successful exploitation could expose critical system files by bypassing security mechanisms in place. The raw HTTP request targets specific directories to retrieve restricted data.

Exploiting this vulnerability can lead to significant security breaches. Unauthorized file access can result in data theft, system manipulation, or unauthorized access. Attackers retrieving sensitive files like system configurations or password files could compromise user and system privacy. It may also lead to further intrusion into the network, potentially affecting the integrity and confidentiality of connected systems. Immediate remedial actions are crucial to mitigate these risks.

REFERENCES

Get started to protecting your digital assets