[8161] in bugtraq
Referer (was Patches for wwwboard.pl)
daemon@ATHENA.MIT.EDU (Michael Blythe)
Fri Oct 9 16:11:22 1998
Date: Fri, 9 Oct 1998 07:45:38 -0800
Reply-To: Michael Blythe <michael@CONFLUENCE-INC.COM>
From: Michael Blythe <michael@CONFLUENCE-INC.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <5F2642D1AAE5D011B8CF00805F5730B4046946@dfsmttayz044.hq.af.mil>
>Since the referer information comes from the remote client, that doesn't
>prevent malicious destruction. Anyone with netcat or telnet could forge the
>referer field. It requires a little more expertise, but not much.
In September's 'Web Techniques', Lincoln Stein dicscusses the problem of
using the referer header as an authentication method for CGI scripts. He
suggests using MD5 to check whether a form's fields have been tampered
with. I'm not sure if this would work with the wwwboard, because of the way
the script is passing info in hidden fields, but it will work in other
applications:
Here's an abbreviated version of his suggestions:
1. Choose a secret key.
2. Decide which form fields should be untamperable.
3. Optional: put in consistency-checking hidden fields.
4. Concatenate the key, the form fields, and the consitency-checking fields.
Compute the MD5 hash* and convert it to a hexadecimal string.
5. Include within the form a new hidden field containing the hash.
6. When the form is returned to your script, make sure all expected fields
are present, and that
expected values are present in the consistency-checking fields.
Recompute the MD5 hash and
compare it to the one in the form field. If they match, "you can be
pretty sure that the form
hasn't been tampered with."
* in perl, the MD5 hash can be computed as follows:
$hash = MD5 -> hexhash(MD5->hexhash ($secret) "@untamperable @consistency");
/mb