[ZendTo] Re: Antwort: Re: Zendto is vulnerable for SQL-Injection
Jules
Jules at Zend.To
Mon May 23 16:50:02 BST 2011
I don't think I can easily do that, sorry.
On 23/05/2011 13:55, Jason Ede wrote:
>
> Jules,
>
> Could you make it so were only allowed 1 active upload stream as well?
> That way even if tried creating lots of extra files whilst a larger
> one was uploading then it wouldn't work as an exploit...
>
> Jason
>
> *From:*zendto-bounces at zend.to [mailto:zendto-bounces at zend.to] *On
> Behalf Of *Jules
> *Sent:* 23 May 2011 09:53
> *To:* ZendTo Users
> *Subject:* [ZendTo] Re: Antwort: Re: Zendto is vulnerable for
> SQL-Injection
>
>
>
> On 22/05/2011 15:09, patrick.gaikowski at kaufland.com
> <mailto:patrick.gaikowski at kaufland.com> wrote:
>
> Hi,
>
> we engaged a company for penetration testing of web applications and
> thats why i tried to be prepared....
>
> I used the tool "burp suite" which is a http/https proxy for
> intercepting web requests / responses.
>
> * i made a dropoff request without username / password --> only
> ReCaptcha
>
> Definitely a bug, now fixed. Well done!
>
> *
> * i intercepted the POST to dropoff.php
>
>
> /(See attached file: dropoff)/
>
> Great, XML, my favourite. :-)
>
> * in the tool you can send the POST to the repeating module and
> modify the POST
> * i was able the send the upload a various times --> the limit
> will be the free space on the host system -->can be used for
> blow up the system and perhaps crash the system
>
> If you don't complete the upload, then you will be able to do that.
> Once the upload has finished, the auth code should be removed (and now
> is! :-) (unless you're a logged in user, at which point we can hunt
> you down anyway).
> I'm not particularly worried about attacks by logged in users. They
> can just repeat the entire upload process as many times as they like
> anyway, uploading either the same files or different files each time.
>
> *
> * i was able to change for example the email-address of the
> recipient (only the domain defined in preferences.php) in the
> POST--> can be used for SPAM if the email domain is not
> configured correctly
>
> Agreed. You can indeed change the email address of the recipient in
> the upload. But then again you can just make your automated hacking
> system slightly more clever and do multiple uploads to anyone you like
> in the the preferences.php configured domain. So I am not worried
> about that either.
>
>
> Is it possible to limit the lifetime of the auth-Parameterto only one
> request?
>
> Well spotted, yes that is a bug. Fixed. That should take care of the
> multiple uploads exploits you found above too.
>
> Many thanks for finding these for me, it is much appreciated!
>
> Cheers,
>
> Jules
>
> --
> Julian Field MEng CITP CEng
> www.Zend.To <http://www.Zend.To>
>
> Follow me at twitter.com/JulesFM
> PGP footprint: EE81 D763 3DB0 0BFD E1DC 7222 11F6 5947 1415 B654
>
> 'All programs have a desire to be useful' - Tron, 1982
>
>
> _______________________________________________
> ZendTo mailing list
> ZendTo at zend.to
> http://mailman.ecs.soton.ac.uk/mailman/listinfo/zendto
Jules
--
Julian Field MEng CITP CEng
www.Zend.To
Follow me at twitter.com/JulesFM
PGP footprint: EE81 D763 3DB0 0BFD E1DC 7222 11F6 5947 1415 B654
'All programs have a desire to be useful' - Tron, 1982
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.ecs.soton.ac.uk/pipermail/zendto/attachments/20110523/1cf6a06b/attachment-0001.html
More information about the ZendTo
mailing list