[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BANLkTi=b_wXqdCh4cKopcjrtes=iknasWg@mail.gmail.com>
Date: Fri, 24 Jun 2011 18:37:35 +0200
From: Christian Sciberras <uuf6429@...il.com>
To: Nahuel Grisolia <nahuel@...sai-sec.com>
Cc: full-disclosure@...ts.grok.org.uk, owasp-argentina@...ts.owasp.org
Subject: Re: ASHX, ASMX or What?
You shouldn't filter against known files, but do the reverse, you should
filter against known good files.
Oh and the medium you decide to throw this data should have special checks
against execution etc...
On Fri, Jun 24, 2011 at 6:16 PM, Nahuel Grisolia <nahuel@...sai-sec.com>wrote:
> List,
>
> Imagine that you're in front of an """"insecure"""" file upload in the
> context of an IIS6,7 (no ;.jpg :P) and the regex filtering the file is
> like:
>
> [anything].asp[anything] (yeah, my.aspirator.jpg is filtered hehe)
>
> No .aspx, no .asp and no .aspx;jpg even if the server is vulnerable...
>
> So... is there any way to bypass this control? Like uploading a
> malicious Webservice (can we simply upload a Webservice file? I think
> they need to be precomplied first) or something like that?
>
> Thanks a lot!
>
> regards,
> --
> Nahuel Grisolia - C|EH
> Information Security Consultant
> Bonsai Information Security Project Leader
> http://www.bonsai-sec.com/
> (+54-11) 4777-3107
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists