lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <NGEHLEPKOGIHAIJAMDPKKEPHDAAA.please-reply-to-list@mailinator.com>
Date: Thu, 2 Nov 2006 18:14:01 -0500
From: "Richard Stanway" <please-reply-to-list@...linator.com>
To: <bugtraq@...urityfocus.com>
Subject: RE: how to trick most of cms avatar upload filter [exemple for : RunCms (PoC)]



> -----Original Message-----
> From: Taneli Leppä [mailto:taneli@...sman.fi]
> Sent: Thursday, November 02, 2006 3:06 PM
> To: securfrog@...il.com
> Cc: bugtraq@...urityfocus.com
> Subject: Re: how to trick most of cms avatar upload filter [exemple for
> : RunCms (PoC)]
>
>
> Taneli Leppä kirjoitti:
> >> then you need to take a good file editor , like: notepad++ (you can
> >> take whatever picture , and edit it without destroying it .)
> >> we need to put some php code AFTER the picture code . when  it's done
> >> , try the picture if it still work , if yes , we are ok :).
> > This actually seems to work. A quick workaround is to disable PHP in the
> > directory where the avatar images are stored (or any user-uploaded files
> > for that matter) in Apache:
> >
> > <Directory "/var/www/html/forum/avatardir">
> >   php_admin_flag engine off
> > </Directory>
>
> Actually, your exploit only works if the avatar system strips the
> .jpg extension for some reason. Unless you have configured .jpg
> as a valid extension to be executed through PHP. But the above
> still stands as a valid precaution for user uploaded material.
>

This isn't entirely true - the exploit will work most of the time due to how
most Apache setups are done, PHP is setup as a mime handler, and mod_mime
will scan every extension, so .php.jpg will actually get executed with the
PHP handler. See http://shsc.info/FileUploadSecurity for more information on
file upload attacks and more details on how Apache works in this regard, as
well as a patch against Apache 1.3 to remove the "double extension"
behaviour.

Rich.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ