[40944] in bugtraq
Re: [Full-disclosure] SEC-Consult SA 20051025-0 :: Snoopy Remote Code Execution Vulnerability
daemon@ATHENA.MIT.EDU (Florian Weimer)
Sat Oct 29 19:15:25 2005
From: Florian Weimer <fw@deneb.enyo.de>
To: Bernhard Mueller <research@sec-consult.com>
Cc: Full Disclosure <full-disclosure@lists.grok.org.uk>,
bugtraq@securityfocus.com
Date: Thu, 27 Oct 2005 10:12:37 +0200
In-Reply-To: <435E9496.9080207@sec-consult.com> (Bernhard Mueller's message of
"Tue, 25 Oct 2005 22:24:54 +0200")
Message-ID: <87hdb3gyyy.fsf@mid.deneb.enyo.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
* Bernhard Mueller:
> While the vulnerability can not be exploited using the Snoopy class
> file itself, there may exist implementations which hand unchecked
> URLs from users to snoopy.
Thanks for the notice.
Have you considered in your analysis that malicious servers might
return HTTP redirects which contain suitable URLs? This requires that
the offsiteok member is set to true, though, because in the version I
looked at, only http:// URLs are considered site-local.
(Note: I haven't tried to exploit this, I just browsed the code.)