lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87hdb3gyyy.fsf@mid.deneb.enyo.de>
Date: Thu, 27 Oct 2005 10:12:37 +0200
From: Florian Weimer <fw@...eb.enyo.de>
To: Bernhard Mueller <research@...-consult.com>
Cc: Full Disclosure <full-disclosure@...ts.grok.org.uk>,
	bugtraq@...urityfocus.com
Subject: Re: SEC-Consult SA 20051025-0 :: Snoopy Remote Code
	Execution Vulnerability


* Bernhard Mueller:

> While the vulnerability can not be exploited using the Snoopy class
> file itself, there may exist implementations which hand unchecked
> URLs from users to snoopy.

Thanks for the notice.  

Have you considered in your analysis that malicious servers might
return HTTP redirects which contain suitable URLs?  This requires that
the offsiteok member is set to true, though, because in the version I
looked at, only http:// URLs are considered site-local.

(Note: I haven't tried to exploit this, I just browsed the code.)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ