lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <40474CC8.6000108@sanctuminc.com>
Date: Thu, 04 Mar 2004 17:35:36 +0200
From: Amit Klein <amit.klein@...ctuminc.com>
To: bugtraq@...urityfocus.com
Subject: A new white paper by Sanctum: "Divide and Conquer - HTTP Response
 Splitting, Web Cache Poisoning Attacks, and Related Topics"


Hi

Today, Sanctum released a new whitepaper, titled "Divide and Conquer
- HTTP Response Splitting, Web Cache Poisoning Attacks, and Related
Topics". The full paper can be found in the following link:
http://www.sanctuminc.com/pdf/whitepaper_httpresponse.pdf

The paper's abstract is copied below:

"HTTP Response Splitting" is a new application attack technique which
enables various new attacks such as web cache poisoning, cross user
defacement, hijacking pages with sensitive user information and an
old favorite, cross-site scripting (XSS). This attack technique, and
the derived attacks from it, are relevant to most web environments
and is the result of the application's failure to reject illegal user
input, in this case, input containing malicious or unexpected
characters.

Cross user defacement enables the attacker to forge a page that is
sent to the victim. It can be looked at as a very localized and
temporary kind of defacement, which affects one user at a time. Web
cache poisoning elevates that defacement into a permanent effect on a
more global scope by forging a cached page in a cache server shared
among a multitude of site users. Hijacking pages with sensitive user
information lets the attacker gain access to user specific
information provided by the server such as health records or
financial data. Cross-site scripting enables the attacker to steal
other client's credentials that are then used in conjunction with the
vulnerable site. HTTP response splitting, and the derived attacks,
are relevant to most web environments including Microsoft ASP,
ASP.NET, IBM WebSphere, BEA WebLogic, Jakarta Tomcat, Macromedia
ColdFusion/MX, Sun Microsystems SunONE; popular cache servers such as
NetCache, Squid and Apache; and popular browsers such as Microsoft
IE 6.0

The HTTP response splitting vulnerability is the result of the
application's failure to reject illegal user input. Specifically,
input containing malicious or unexpected CR and LF characters.

This paper will describe the concept of the attack and provide some
use cases. We will include a description of the basic technique and
practical considerations of various aspects of the attack and some
theoretic results in one case. Finally, we comment on evidence of the
vulnerability in the wild, some research byproducts, recommendations,
conclusions, related work and references. The full list of products
we experimented with is provided in the appendix.

Thanks,
-Amit

Amit Klein
Director of security and research, Sanctum
W: +972-9-9586077 x225, F: +972-9-9576337
1 Sapir St., Ampa Bldg., Herzlia 46733 Israel
amit.klein@...ctuminc.com




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ