Package: links-ssl
Version: 0.96.20020409-2
Severity: grave
Tags: security
Justification: user security hole

Hi,

put this into an HTML file:

<a href="http://localhost:12345/blah.php&#10;Host:blurgl.tld&#10;X-Blub:";>a</a>

when using that link, links-ssl (I guess that this applies to links without
ssl, too) will generate the following request to localhost, port 12345:

| GET /blah.php
| Host:blurgl.tld
| X-Blub: HTTP/1.1
| Host: localhost:12345
| User-Agent: ELinks (0.4pre5; Linux 2.4.27 i686; 132x60)
| Accept: */*
| Connection: Keep-Alive

Apart from the fact that this shouldn't happen, I could imagine at least
this particular scenario to be used in an attack: On a sufficiently
permissive HTTP server that allows the protocol version field to be
missing and that accepts the first Host: header as the significant
one, this could lead to cookies belonging to localhost:12345 getting
into the hands of the virtual host blurgl.tld on the same server.

Cya, Florian

-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux florz 2.4.27 #3 Sat Aug 28 04:55:31 CEST 2004 i686
Locale: LANG=C, [EMAIL PROTECTED]

Versions of packages links-ssl depends on:
ii  libc6                   2.2.5-11.8       GNU C Library: Shared libraries an
ii  libgpmg1                1.19.6-12        General Purpose Mouse Library [lib
ii  liblua40                4.0-4            Main interpreter library for the L
ii  liblualib40             4.0-4            Extension library for the Lua prog
ii  libssl0.9.6             0.9.6c-2.woody.7 SSL shared libraries



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to