lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: 10 May 2004 21:16:30 -0000
From: Nuno Costa <webcenter@...o.pt>
To: bugtraq@...urityfocus.com
Subject: a litle bypass with IE





hello

im not a expert in this area, but i work in a intranet that haves the Squid/2.3.STABLE5 filtring all access's to the internet.. 

so i don't have access to the internet directaly, but i know that this proxy allow access to especific web sites.. so, in the past if i us this:

http://url@...site_allowed.pt -> the vuln that is already discovered... i have access to the website that i want...

but in this days, this vuln is now fixed so...

in my test's i found this way to pass this proxy, using:

http://@@website_allowed.pt@...url -> now i have access...

using @@url.pt@ i can bypass the proxy and access the internet, i don't know how faur, this could go!!

so i don't know if this is a bug from IE or just a simple bug from Squid.. ??? can anyone tell what we have in hands ?

PS: sorry my inglish



Nuno Costa
webcenter@...o.pt
Portugal


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ