[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200303221935.h2MJZW919469@web178.megawebservers.com>
From: http-equiv at malware.com (http-equiv@...ite.com)
Subject: Fw: CERT: Vulnerability in web redirectors
http://shorterlink.com/?7WVJZ7
----- Original Message -----
Like this one?:
--------------------
http://srd.yahoo.com/S=2766679:WS1/R=1/K=microsoft+sux/H=0/T=104835750
0/F=131cc5f493bf26b0a115b6debc24d362/*http://www.cryptome.org
--------------------
(may be wrapped)
Georgi
Kurt Seifried wrote:
> Like hack4life stated this is a pretty well known problem. Solving
it isn't
> to hard. Legitimate clients will send an HTTP referer, thus for some
> unsuspecting user who clicks on a redirect link in an email they
will send a
> blank referer, or off a website that referer. So simply add some
logic in
> your script to check the referer, a quick and dirty in php for
example (yes,
> this code is horrible and ugly, but it's a reasonably clear
example):
>
> <HTML>
> <HEAD>
> <TITLE>You are now leaving example.org</TITLE>
> <?php
> if (preg_match ("/example\.org\//i", $_SERVER["HTTP_REFERER"] )) {
>
> print "<META http-equiv=\"refresh\" content=\"1;URL=";
> echo $_SERVER["QUERY_STRING"];
> print "\">";
> print "</HEAD>";
> print "<BODY bgcolor=\"#ffffff\">";
> print "<P>[1] Redirecting you to:";
> print "<A HREF=\"";
> echo $_SERVER["QUERY_STRING"];
> print "\">";
> echo $_SERVER["QUERY_STRING"];
> print "</A>, if it doesn't work click on the link.</P>";
> print "<P>";
> echo $_SERVER["HTTP_REFERER"];
> print "</P>";
> } else {
> print "</HEAD>";
> print "<BODY bgcolor=\"#ffffff\">";
> print "<P>Someone has tried to use this site's web redirector in
an
> attempt to make a link appear legitimate.</P>";
> }
> ?>
>
> Obviously this is not bullet proof, anyone who hacks their client
to send
> fake referer's can get around it, but then we aren't trying to
block that
> kind of person, we're simply trying to prevent widespread abuse by a
> spammer/etc.
>
>
> Kurt Seifried, kurt@...fried.org
> A15B BEE5 B391 B9AD B0EF
> AEB0 AD63 0B4E AD56 E574
> http://seifried.org/security/
>
--
http://www.malware.com
Powered by blists - more mailing lists