lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY10-DAV32296D85C4A28BD93E9FE6D9200@phx.gbl>
Date: Mon Apr 25 05:38:04 2005
From: se_cur_ity at hotmail.com (Morning Wood)
Subject: Some Web-programmer flaw 'may' result in
	codeexecution in server side!

i used to have my UA set to a basic xss script...
many sites are vulnerable to this.
The most troubling is the fact that many web based reporting / log tools
are in html format, thus rendering the UA injection in the browser of the
person reading the logs ( most likely an admin behind the corporate
firewall ),
thus exposing him / her to possible browser based attack scenarios.

cheers,
Donnie Werner
http://exploitlabs.com
http://zone-h.org


----- Original Message ----- 
From: "Bipin Gautam" <gautam.bipin@...il.com>
To: <full-disclosure@...ts.grok.org.uk>
Sent: Sunday, April 24, 2005 7:39 PM
Subject: [Full-disclosure] Some Web-programmer flaw 'may' result in
codeexecution in server side!


These days, i've seen a trend in some so-called computer security
related websites. They have a feature to show a summary about the user
in some page in their website

Like;
-----
Real IP:
User Agent:
Transperent Proxy Ip:   etc...

---------

the problem lies when you supply a malicious user agent.

a basic test could be,

User Agent: <h1> Hello World! </h1> or some java script... better try
PHP instead!!!

regads,
bipin
http://bipin.tk
---
Bipin Gautam
http://bipin.tk

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ