[7033] in bugtraq

home help back first fref pref prev next nref lref last post

Re: guestbook script is still vulnerable under apache

daemon@ATHENA.MIT.EDU (Lars Eilebrecht)
Thu Jun 25 22:05:32 1998

Date: 	Fri, 26 Jun 1998 02:25:14 +0200
Reply-To: Lars.Eilebrecht@UNIX-AG.ORG
From: Lars Eilebrecht <Lars.Eilebrecht@UNIX-AG.ORG>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <XFMail.980625150741.markjr@shmOOze.net>

According to Stunt Pope:

[...]
>  ...also seems to work. So it seems to me that the vulnerability exists
>  because:
>
>          1) It's assumed an attacker will enter a correctly formed SSI
>          2) the httpd executes malformed SSI's

IMHO the guestbook script should not try to strip out SSIs, but rather
reject every input which contain the sequence "<!--#".

Apache handles SSI directives as soon as they appear in the document and
doesn't wait for the "-->" ending sequence (By the way, it is possible to use
more than one directive inside a SSI expression,
e.g. <!--#exec cmd="script1.sh" cmd="script2.sh" -->).

If the ending sequence is missing Apache outputs the error message
"premature EOF in parsed file /path/to/file", but IMHO there is no
reason why it shouldn't execute a valid SSI directive.

Exec-SSIs are a security problem itself and one should know about the risks
when enabling them (and enabling them for pages which are generated
from user input, e.g. guestbook pages, is just a stupid idea).


just my $0.02...
--
Lars Eilebrecht                               - Fatal system error:
sfx@unix-ag.org                        - no coffee detected; user halted.
http://www.home.unix-ag.org/sfx/

home help back first fref pref prev next nref lref last post