lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1413398880.14660.22.camel@banzai> Date: Wed, 15 Oct 2014 20:48:00 +0200 From: Nicolas Grégoire <nicolas.gregoire@...rri.fr> To: bugtraq@...urityfocus.com, fulldisclosure@...lists.org Subject: [FD] Bypassing blacklists based on IPy IPy is a Python "class and tools for handling of IPv4 and IPv6 addresses and networks" (https://github.com/haypo/python-ipy). This library is sometimes used to implement blacklists forbidding internal, private or loopback addresses. Using octal encoding (supported by urllib2), it is possible to bypass checks based on the result of the iptype() function. For example, IP address '0177.0000.0000.0001' is considered as 'PUBLIC' but resolves to '127.0.0.1' when accessed via urllib2. Developers were informed, no news since then... More details on my blog: http://www.agarri.fr/kom/archives/2014/10/15/bypassing_blacklists_based_on_ipy/index.html Cheers, Nicolas Grégoire _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists