From: K. K. Mookhey (cto@nii.co.in)
Date: Wed Aug 18 2004 - 14:04:01 EDT
Typically, the way in which this problem can be exploited is similar to
an XSS attack. You would send another user of that site a URL that had
vulnsite.com to begin with, but would redirect him to an obfuscated IP
address or URL of the attacker's choice. The attacker's site could be
set up to mimic the original website, or it could try and download
malicious code to exploit browser vulnerabilities, or it could be used
to try and steal his cookie. This is definitely a security vulnerability.
ramatkal@hotmail.com wrote:
>
> During a recent Application pen test I came across a url of the form:
>
>
>
> http://www.vulnsite.com/cgi-bin/vulnscript.jsp?url=www.website.com&id=12345
>
>
>
> I changed the url parameter to something like url=www.google.com and google appeared in my browser. Next, i changed the url to url=www.whatismyip.com, hoping that the ip address of the webserver would be displayed, however, only my ip address was displayed.
>
>
>
> This means that my browser is loading the url parameter as opposed to the webserver script fethching the url and then displaying it for me in my browser right? Is this a security issue?
>
>
>
>
>
------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.securityfocus.com/sponsor/InfoSecInstitute_pen-test_040817
-------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:59 EDT