hi,all
I have got several questions here,and maybe you can give me some advice.
What I am trying to do is write a product which can communicate with ODBC Socket
Server,
a win32 server application that allow applications to have access to Data Sources
managed by Windows ODBC
DataSource
Found vulnerability: retrieve a full path to local files in Zope.
---[ Example 1 (Linux):
telnet www.zope.org 80
PROPFIND / HTTP/1.0
F
G
H
J
K
L
HTTP/1.0 500 Internal Server Error
Server: Zope/Zope 2.3.2 (source release, python 1.5.2, linux2) ZServer/1.1b1
Date: Mon, 10 Sep 2001 15:38:59 GMT
Do others consider this a vulnerability? While it reveals more
information than people might want, I'm curious about scenarios under
which it could be exploited.
If any of you know of something *specific*, meaning it's a genuinely
exploitable vulnerability, please email me or Brian Lloyd
I just took a look at ODBC Socket Server, which I had never seen before.
Pretty interesting! Here's some comments.
1) It looks like socket server opens a new socket for processing every
request. In this respect, it goes against one of the benefits of
database adapters, which keep a
On Sun, Sep 23, 2001 at 10:36:33AM -0400, Paul Everitt wrote:
Do others consider this a vulnerability? While it reveals more
information than people might want, I'm curious about scenarios under
which it could be exploited.
If any of you know of something *specific*, meaning it's a
Example:
http://www.zope.org/Documentation/SCRIPTalert(document.domain)/SCRIPT
http://www.zope.org/lalalalalSCRIPTalert(document.domain)/SCRIPT
http://www.zope.org/SCRIPTalert(document.cookie)/SCRIPT
For example, an attacker might post a message like
Hello message board. This is a
Do others consider this a vulnerability?
Yup... especially given the hard-coded (sigh) error page returned for
authentication error gives out this information :-(
Chris
___
Zope-Dev maillist - [EMAIL PROTECTED]
Hello message board. This is a message.
SCRIPTmalicious code/SCRIPT
This is the end of my message.
I don't really see your point other than a carelessly implemented app may
expose these kind of vulnerabilities. Python (and hence Zope) has a library
for stripping
Vulnerability: attacking can get file list and directory
Tested on Win32 platform
Example:
telnet zopeserver 8080
PROPFIND / HTTP/1.0
enter
enter
enter
list files and directory
This tested on my site:
security.instock.ru 8080
___
Zope-Dev
Aargh,
I sent that first to [EMAIL PROTECTED] ...
Hello message board. This is a message.
SCRIPTmalicious code/SCRIPT
This is the end of my message.
I don't really see your point other than a carelessly implemented app may
expose these kind of
Haven't we been complaining about this automatic appending of tracebacks for
a while? To me this is what log files are for but Im not sure what this
guy is on. I wouldnt count this as a security vulnerability.
- Original Message -
From: Chris Withers [EMAIL PROTECTED]
To: Paul
What does this have to do with Zope? Its down to an individual application.
- Original Message -
From: ALife [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Sunday, September 23, 2001 10:23 AM
Subject: [Zope-dev] New: Cross Site Scripting vulnerability
Example:
I imagine that the group will decide rules on peer reviewing. For
comparison, the Mozilla group has very elaborate rules for checkins,
while Python has pretty much an innocent until proven guilty culture.
(That is, you check something in, and if somebody complains, it gets
removed.)
I
Example:
http://www.zope.org/Documentation/SCRIPTalert(document.domain)/SCRIPT
http://www.zope.org/lalalalalSCRIPTalert(document.domain)/SCRIPT
http://www.zope.org/SCRIPTalert(document.cookie)/SCRIPT
For example, an attacker might post a message like
Hello message board. This is
Vulnerability: attacking can get file list and directory
Tested on Win32 platform
Example:
telnet zopeserver 8080
PROPFIND / HTTP/1.0
enter
enter
enter
list files and directory
This tested on my site:
security.instock.ru 8080
This one really seems to be the old WebDAV is not
15 matches
Mail list logo