[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87hdb3gyyy.fsf@mid.deneb.enyo.de>
Date: Thu Oct 27 09:14:09 2005
From: fw at deneb.enyo.de (Florian Weimer)
Subject: SEC-Consult SA 20051025-0 :: Snoopy Remote Code
Execution Vulnerability
* Bernhard Mueller:
> While the vulnerability can not be exploited using the Snoopy class
> file itself, there may exist implementations which hand unchecked
> URLs from users to snoopy.
Thanks for the notice.
Have you considered in your analysis that malicious servers might
return HTTP redirects which contain suitable URLs? This requires that
the offsiteok member is set to true, though, because in the version I
looked at, only http:// URLs are considered site-local.
(Note: I haven't tried to exploit this, I just browsed the code.)
Powered by blists - more mailing lists