[14266] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Extending the FTP "ALG" vulnerability to any FTP client

daemon@ATHENA.MIT.EDU (Mitchell Blank Jr)
Tue Mar 14 17:12:09 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID:  <20000311160847.C56685@sfgoth.com>
Date:         Sat, 11 Mar 2000 16:08:47 -0800
Reply-To: Mitchell Blank Jr <mitch@SFGOTH.COM>
From: Mitchell Blank Jr <mitch@SFGOTH.COM>
X-To:         Mikael Olsson <mikael.olsson@ENTERNET.SE>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <38C8C648.B7CCE2C8@enternet.se>; from mikael.olsson@ENTERNET.SE
              on Fri, Mar 10, 2000 at 10:54:16AM +0100

Mikael Olsson wrote:
>   * Send an email to the address in question containing an img
>     src ftp://ftp.rooted.com:23456 and hope that the firewall
>     won't realise that port 23456 is FTP.

It would be nice if the browsers had a "disallow FTP to non-
standard ports" checkbox.

>   That would help against the above attack, but not if we
>   modify it a wee bit:
>
>   src="ftp://ftp.rooted.com/aaaaaaa%0a%0dPORT 1,2,3,4,0,139"

Actually, on some firewalls you might be able to skip
all the aaaaaaa's then, since PORT is now legitamately another
command.

>   Ouch. This WILL work in a browser

Then that browser has a bug that needs to be fixed.  There's
no way for a FTP filename to legitamately have a CRLF string
inside it - if the browser allows embedding them then
they essentially allow a link to include arbitrary FTP
commands, and that's not good.

You might want to check if the (unspecified) browser has
similar bugs in other protocols.

-Mitch

home help back first fref pref prev next nref lref last post