You can define a CheckURL directive to trap the invalid characters.  (for 
instance, I don't believe < or > can appear inline in a URL, it would have to 
be % escaped)

http://stackoverflow.com/questions/1547899/which-characters-make-a-url-invalid

Thus you might want to include a line such as:
CheckURL "^[!#$&-;=?-[]_a-zA-Z~]+$"

(note the regex is based on the Leif Wickland responder... You might want to 
check the &-; and ?-[ ranges, for instance.  I take no responsibility for 
correctness in your environment)

Given the URL you have supplied the URL would throw a 500 error based on the " 
in your request and the <> characters.

Joe

> -----Original Message-----
> From: Kevin Bowling [mailto:[email protected]]
> Sent: Friday, November 18, 2011 1:04 AM
> To: [email protected]
> Subject: Re: [Pound Mailing List] Pound CSRF vulnerability in redirects
> 
> Here is what the system claims the actual exploit looks like>
> 
> HTTP/1.0 301 Moved Permanently
> Location:
> https://<domain>.com:7443/"><script>alert(document.domain)</script>.htm
> l
> Content-Type: text/html
> Content-Length: 264
> 
> <html><head><title>Redirect</title></head><body> Redirect  You should
> go to
> <script>alert(document.domain)</script>.html">https://<domain>.com:7443
> /"><script>alert(document.domain)</script>.html
> (https://<domain>.com:7443/)</p></body></html>
> 
> GET /"><script>alert(document.domain)</script>.html HTTP/1.0
> Host: <ip>:7080
> User-Agent: QualysGuard
> 
> On Thu, Nov 17, 2011 at 5:07 PM, Kevin Bowling
> <[email protected]> wrote:
> > Hi,
> >
> > This is very low risk because any browser that doesn't obey the HTTP
> > 301 code is likely ancient and vulnerable.
> >
> > One place this matters is automated scanning tools.  I have a system
> > that is being audited for PCI compliance by a tool from qualys which
> > is basically a glorified port scanner.  It passes in a
> > <script></script> nonsense on the URL and sure enough pound repeats
> > this in the document fallback if the HTTP 301 redirect is not obeyed.
> >
> > It is a bad idea, the URL should be scrubbed (hard), or simply
> > repeated without an <a href=...> and let the user figure it out?
> >
> > Regards,
> > Kevin
> >
> > --
> > To unsubscribe send an email with subject unsubscribe to
> [email protected].
> > Please contact [email protected] for questions.
> >
> 
> --
> To unsubscribe send an email with subject unsubscribe to
> [email protected].
> Please contact [email protected] for questions.

--
To unsubscribe send an email with subject unsubscribe to [email protected].
Please contact [email protected] for questions.

Reply via email to