Send Motion-user mailing list submissions to
        motion-user@lists.sourceforge.net

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.sourceforge.net/lists/listinfo/motion-user
or, via email, send a message with subject or body 'help' to
        motion-user-requ...@lists.sourceforge.net

You can reach the person managing the list at
        motion-user-ow...@lists.sourceforge.net

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Motion-user digest..."


Today's Topics:

   1. Re: motion security patch release 3.4.2 (Damian)
   2. Re: motion security patch release 3.4.2 (tosiara)
   3. Re: motion security patch release 3.4.2 (Mike Wilson)


----------------------------------------------------------------------

Message: 1
Date: Mon, 26 Oct 2020 11:42:04 +0100
From: Damian <motion-u...@arcsin.de>
To: motion-user@lists.sourceforge.net
Subject: Re: [Motion-user] motion security patch release 3.4.2
Message-ID: <0cf8b8c4-3d8c-3748-9533-06cf2e69d...@arcsin.de>
Content-Type: text/plain; charset=utf-8

> The default config restricts stream and webcontrol ports to localhost, so
> it is a partial mitigation that comes out of the box. In that case a remote
> attacker would need to use additional techniques to perform a request to
> localhost, but it is still possible (ex, CSRF). The only full mitigations
> are either patch to 3.4.2, or completely disable ports

What about setups with webcontrol@localhost behind a reverse proxy? Are
malicious requests exotic in nature so that they would be blocked by the
proxy or are they regular HTTP requests that motion just cannot handle?




------------------------------

Message: 2
Date: Mon, 26 Oct 2020 13:38:07 +0200
From: tosiara <tosi...@gmail.com>
To: Motion discussion list <motion-user@lists.sourceforge.net>
Subject: Re: [Motion-user] motion security patch release 3.4.2
Message-ID:
        <cachtdwsjapgzy_fmgx7w9udrtk_qvn3hz-j_te8jaugi31x...@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"

Unfortunately, reverse proxy would not help too. Since reverse proxies
carry the entire URI with all the params, it will also pass the malicious
ones, and will trigger the bug.

Speaking about the maliciousness of the request, it is malformed in terms
of RFC, but browsers still handle it as is and I have never seen such urls
being rejected or causing crash.


On Mon, Oct 26, 2020 at 1:03 PM Damian via Motion-user <
motion-user@lists.sourceforge.net> wrote:

> > The default config restricts stream and webcontrol ports to localhost, so
> > it is a partial mitigation that comes out of the box. In that case a
> remote
> > attacker would need to use additional techniques to perform a request to
> > localhost, but it is still possible (ex, CSRF). The only full mitigations
> > are either patch to 3.4.2, or completely disable ports
>
> What about setups with webcontrol@localhost behind a reverse proxy? Are
> malicious requests exotic in nature so that they would be blocked by the
> proxy or are they regular HTTP requests that motion just cannot handle?
>
>
>
> _______________________________________________
> Motion-user mailing list
> Motion-user@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/motion-user
> https://motion-project.github.io/
>
> Unsubscribe: https://lists.sourceforge.net/lists/options/motion-user
>
-------------- next part --------------
An HTML attachment was scrubbed...

------------------------------

Message: 3
Date: Mon, 26 Oct 2020 10:51:44 -0400
From: Mike Wilson <knobby2...@gmail.com>
To: Motion discussion list <motion-user@lists.sourceforge.net>
Subject: Re: [Motion-user] motion security patch release 3.4.2
Message-ID:
        <CAAVeUCrg+NVaPRDx7p=kxbf0m8rswryagsg-o+hcupnfeiv...@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"

Thank you for sending out this notification.


On Mon, Oct 26, 2020 at 7:40 AM tosiara <tosi...@gmail.com> wrote:

> Unfortunately, reverse proxy would not help too. Since reverse proxies
> carry the entire URI with all the params, it will also pass the malicious
> ones, and will trigger the bug.
>
> Speaking about the maliciousness of the request, it is malformed in terms
> of RFC, but browsers still handle it as is and I have never seen such urls
> being rejected or causing crash.
>
>
> On Mon, Oct 26, 2020 at 1:03 PM Damian via Motion-user <
> motion-user@lists.sourceforge.net> wrote:
>
>> > The default config restricts stream and webcontrol ports to localhost,
>> so
>> > it is a partial mitigation that comes out of the box. In that case a
>> remote
>> > attacker would need to use additional techniques to perform a request to
>> > localhost, but it is still possible (ex, CSRF). The only full
>> mitigations
>> > are either patch to 3.4.2, or completely disable ports
>>
>> What about setups with webcontrol@localhost behind a reverse proxy? Are
>> malicious requests exotic in nature so that they would be blocked by the
>> proxy or are they regular HTTP requests that motion just cannot handle?
>>
>>
>>
>> _______________________________________________
>> Motion-user mailing list
>> Motion-user@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/motion-user
>> https://motion-project.github.io/
>>
>> Unsubscribe: https://lists.sourceforge.net/lists/options/motion-user
>>
> _______________________________________________
> Motion-user mailing list
> Motion-user@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/motion-user
> https://motion-project.github.io/
>
> Unsubscribe: https://lists.sourceforge.net/lists/options/motion-user
-------------- next part --------------
An HTML attachment was scrubbed...

------------------------------



------------------------------

Subject: Digest Footer

_______________________________________________
Motion-user mailing list
Motion-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/motion-user


------------------------------

End of Motion-user Digest, Vol 172, Issue 18
********************************************

Reply via email to