[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87hdb3gyyy.fsf@mid.deneb.enyo.de>
Date: Thu, 27 Oct 2005 10:12:37 +0200
From: Florian Weimer <fw@...eb.enyo.de>
To: Bernhard Mueller <research@...-consult.com>
Cc: Full Disclosure <full-disclosure@...ts.grok.org.uk>,
bugtraq@...urityfocus.com
Subject: Re: SEC-Consult SA 20051025-0 :: Snoopy Remote Code
Execution Vulnerability
* Bernhard Mueller:
> While the vulnerability can not be exploited using the Snoopy class
> file itself, there may exist implementations which hand unchecked
> URLs from users to snoopy.
Thanks for the notice.
Have you considered in your analysis that malicious servers might
return HTTP redirects which contain suitable URLs? This requires that
the offsiteok member is set to true, though, because in the version I
looked at, only http:// URLs are considered site-local.
(Note: I haven't tried to exploit this, I just browsed the code.)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists