Anger growing....

string -> number.

it breaks,

deal with it, and move on.

why is this a problem again?

On 15 Feb 2011, at 05:06, Chris Schmidt wrote:

> I would assume just about any app with a shopping cart does. This is of 
> course compounded by libraries like struts and spring mvc that autobind your 
> form variables for you. Use a form with a double in it and your boned.
> 
> Sent from my iPwn
> 
> On Feb 14, 2011, at 8:57 AM, "Wall, Kevin" <kevin.w...@qwest.com> wrote:
> 
>> Jim Manico wrote...
>>> Rafal,
>>> 
>>> It's not that tough to blacklist this vuln while you are waiting for your
>>> team to patch your JVM (IBM and other JVM's have not even patched yet).
>>> I've seen three generations of this filter already. Walk with me, Rafal and
>>> I'll show you. :)
>>> 
>>> 1) Generation 1 WAF rule (reject one number only)
>>> 
>>> This mod security rule only blocks a small portion of the DOSable range.
>>> The mod security team is working to improve this now (no disrespect meant
>>> at all!)
>>> 
>>> SecRule ARGS|REQUEST_HEADERS "@contains 2.2250738585072012e-308"
>>> "phase:2,block,msg:'Java Floating Point DoS Attack',tag:'CVE-2010-4476'"
>>> 
>>> Reference: http://mobile.twitter.com/modsecurity/status/35734652652093441
>>> 
>> 
>> Depending how & when the exponent conversion is done, this mod_security rule
>> may be completely ineffective. For example, if an attacker can write this
>> floating point # as the equivalent
>> 
>>       22.250738585072012e-309
>> 
>> (which note, I have not tested), then the test above is invalid. I presumed 
>> that
>> this was why Adobe's blacklist *first* removed the decimal point. Adobe's 
>> blacklist
>> could be generalized a bit to cover appropriate ranges with a regular 
>> expression,
>> but I agree wholeheartedly with you that what you dubbed as the "Chess 
>> Defense"
>> (I like it) is the best approach short of getting a fix from the vendor of 
>> your
>> JRE.
>> 
>> So on a somewhat related note, does anyone have any idea as to how common it 
>> is for
>> application developers to call ServletRequest.getLocale() or 
>> ServletRequest.getLocales()
>> for Tomcat applications? Just curious. I'm sure it's a lot more common than
>> developers using double-precision floating point in their applications (with
>> the possible exception within the scientific computing community).
>> 
>> -kevin
>> ---
>> Kevin W. Wall           Qwest Risk Mgmt / Information Security
>> kevin.w...@qwest.com    Phone: 614.215.4788
>> "It is practically impossible to teach good programming to students
>> that have had a prior exposure to BASIC: as potential programmers
>> they are mentally mutilated beyond hope of regeneration"
>>   - Edsger Dijkstra, How do we tell truths that matter?
>>     http://www.cs.utexas.edu/~EWD/transcriptions/EWD04xx/EWD498.html
>> 
>> This communication is the property of Qwest and may contain confidential or
>> privileged information. Unauthorized use of this communication is strictly
>> prohibited and may be unlawful.  If you have received this communication
>> in error, please immediately notify the sender by reply e-mail and destroy
>> all copies of the communication and any attachments.
>> 
>> _______________________________________________
>> Secure Coding mailing list (SC-L) SC-L@securecoding.org
>> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
>> List charter available at - http://www.securecoding.org/list/charter.php
>> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
>> as a free, non-commercial service to the software security community.
>> Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
>> _______________________________________________
> 
> _______________________________________________
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
> as a free, non-commercial service to the software security community.
> Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
> _______________________________________________

-- 
Pete Shanahan  + 353 (87) 412 9576
Any problem in Computer Science can be solved by adding another layer of 
indirection

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to