[38104] in bugtraq

home help back first fref pref prev next nref lref last post

Santy and SSL

daemon@ATHENA.MIT.EDU (Ofer Shezaf)
Thu Jan 6 18:30:46 2005

Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Date: Thu, 6 Jan 2005 16:39:47 -0500
Message-ID: <01FE74AA95A56946ADF84A4976618B97A1C1D3@utopiasystems.net>
From: "Ofer Shezaf" <Ofer.Shezaf@breach.com>
To: <bugtraq@securityfocus.com>
Content-Transfer-Encoding: 8bit


Since my company sells a product that decrypts SSL traffic in order to
enable intrusion detection systems to inspect it, I was looking for
examples of real world attacks hidden in SSL traffic.

As part of this research I examined Santy and found out that:
a. there are many phpBB sites protected by SSL:
I Just Googled something like: "inurl:https inurl:viewtopic
inurl:highlight", which is similar to the Santy search but also
requiring the page to be SSL protected and found 2000. Not enough to
spread a worm, but certainly enough to find some vulnerable sites to
deface.

b. Santy itself did not address SSL:
It parsed found URL using the pattern s#^http://##i (thus ignoring https
sites) and naturally also did not assume port 443 for https protocol.

Since modifying the code to handle SSL requires changing two lines, I
wondered if somebody has seen a variant or similar attack over SSL?

Ofer Shezaf
CTO, Breach Security

Tel: +972.9.956.0036 ext.212
Cell: +972.54.443.1119
ofers@breach.com
www.breach.com 


home help back first fref pref prev next nref lref last post