Author | Post | |||
unknown user |
. |
|||
27.04.2008 01:41:47 |
|
|||
quangntenemy |
Well I was close that was one of the meta tags Looks like SEO is a good thing for security too |
|||
Edited by quangntenemy on 27.04.2008 02:41:17 | ||||
27.04.2008 02:40:35 |
|
|||
unknown user |
too bad there aren't any second prizes. btw there are a few scripts around the challenge sites that aren't that bulletproof against this known problem. I'm too uninterested to develop exploits for all this, but scripts like http://www.net-force.nl/challenge/level407/LeetSS/readme/?show=something_that_will_be_echo'ed_back_without_explicit_charset look to me as if there is a large chance they are vulnerable to a lot of charset messing. but hey, who knows. I would expect Eierkoek's code to be safe... I would however add some charset header, just to be cautious i got bored when my utf7 didn't work, probably cause there's a stray "-" you probably need to master somehow(also don't forget that + in http means space you you need to html encode your utf7 encoding ). Let me know if you guys wrestle up some exploits. |
|||
27.04.2008 04:11:22 |
|
|||
MonkeyMan2000 |
Impressive find rhican. Would you say this is a commonly exploited piece? More details of this exploit would be lovely Thanks anyways |
|||
27.04.2008 10:55:48 |
|
|||
unknown user |
these types of exploits are what typically breaks high risk websites like google. which otherwise have impeccable filters. http://www.securiteam.com/securitynews/6Z00L0AEUE.html it is less common, but perhaps more dangerous because of it. It's as old as the street, but people still think filtering the less than sign is more than sufficient. Because they are stupid that way. however, exploits are less reliable since they depend on the browser more, and it requires more effort than usual xss/content injnection. |
|||
27.04.2008 11:33:23 |
|
|||
MonkeyMan2000 |
Thanks Rhican! Very interesting article. One thing I will now take notice of! Surely this problem can be fixed by using default options on IDE's like Dreamweaver when making pages. Is it just the UTF-7 encoding exploitable or is many other charsets? (Appologies if these are noobish questions ) |
|||
27.04.2008 13:54:01 |
|
|||
Towley |
you can even exploit php addslashes when some charsets are used: http://shiflett.org/blog/2006/jan/addslashes-versus-mysql-real-escape-string |
|||
27.04.2008 16:22:20 |
|
|||
unknown user |
there are quite a few charset that can be used to fool filters. I'll leave you the joy of compiling a comprehensive list, and sharing it. I'm not going to bother compiling my bookmarks. |
|||
27.04.2008 19:21:54 |
|
|||
unknown user |
. |
|||
27.04.2008 19:42:33 |
|
|||
MonkeyMan2000 |
Thats pretty interesting, ive never known about character encoding exploitation. |
|||
27.04.2008 19:54:27 |
|