Re: [Zope-dev] Vulnerability in Zope
On Sun, 2001-09-23 at 17:00, Andy McKay wrote: > > [snip] > Haven't we been complaining about this automatic appending of tracebacks for > a while? To me this is what log files are for but Im not sure what this > guy is on. I wouldnt count this as a "security vulnerability". Hmm. It's 'side-band' information. Assuming that a cracker could get arbitrary code to run on the server through some other vulnerability (say a buffer overflow in some daemon), this information could be exploited to make their attack on the Zope installation more targeted. All this is assuming that the cracker in question is very clever, and has something in mind that is more subtle that simply shutting the server down, because if they can get arbitrary code to run on the server, it's toast anyway. An example of a subtle attack would be re-writing an e-commerce product so that any credit-card information would get silently copied and forwarded elsewhere. In short, the principle here is that *given* that some other vulnerability could give a cracker access to the server in some way, you still don't want to give them any more information on the server configuration than you have to. Michael Bernstein. ___ Zope-Dev maillist - [EMAIL PROTECTED] http://lists.zope.org/mailman/listinfo/zope-dev ** No cross posts or HTML encoding! ** (Related lists - http://lists.zope.org/mailman/listinfo/zope-announce http://lists.zope.org/mailman/listinfo/zope )
Re: [Zope-dev] Vulnerability in Zope
seb bacon wrote: > > * Andy McKay <[EMAIL PROTECTED]> [010924 01:11]: > > Haven't we been complaining about this automatic appending of tracebacks for > > a while? To me this is what log files are for but Im not sure what this > > guy is on. I wouldnt count this as a "security vulnerability". > > It's not an exploitable vulnerability (which is the only sort of > vulnerability in my book ;) but it's as ugly as a warthog, and it would > be nice to arrange things more gracefully. I just had a _really_ bad attack of Deja Vu reading this thread :-S Chris ___ Zope-Dev maillist - [EMAIL PROTECTED] http://lists.zope.org/mailman/listinfo/zope-dev ** No cross posts or HTML encoding! ** (Related lists - http://lists.zope.org/mailman/listinfo/zope-announce http://lists.zope.org/mailman/listinfo/zope )
Re: [Zope-dev] Vulnerability in Zope
* Andy McKay <[EMAIL PROTECTED]> [010924 01:11]: > Haven't we been complaining about this automatic appending of tracebacks for > a while? To me this is what log files are for but Im not sure what this > guy is on. I wouldnt count this as a "security vulnerability". It's not an exploitable vulnerability (which is the only sort of vulnerability in my book ;) but it's as ugly as a warthog, and it would be nice to arrange things more gracefully. seb > > - Original Message - > From: "Chris Withers" <[EMAIL PROTECTED]> > To: "Paul Everitt" <[EMAIL PROTECTED]>; "ALife" <[EMAIL PROTECTED]> > Cc: <[EMAIL PROTECTED]> > Sent: Sunday, September 23, 2001 10:44 AM > Subject: Re: [Zope-dev] Vulnerability in Zope > > > > > Do others consider this a vulnerability? > > > > Yup... especially given the hard-coded (sigh) error page returned for > > authentication error gives out this information :-( > > > > Chris > > ___ Zope-Dev maillist - [EMAIL PROTECTED] http://lists.zope.org/mailman/listinfo/zope-dev ** No cross posts or HTML encoding! ** (Related lists - http://lists.zope.org/mailman/listinfo/zope-announce http://lists.zope.org/mailman/listinfo/zope )
Re: [Zope-dev] Vulnerability in Zope
Haven't we been complaining about this automatic appending of tracebacks for a while? To me this is what log files are for but Im not sure what this guy is on. I wouldnt count this as a "security vulnerability". - Original Message - From: "Chris Withers" <[EMAIL PROTECTED]> To: "Paul Everitt" <[EMAIL PROTECTED]>; "ALife" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Sunday, September 23, 2001 10:44 AM Subject: Re: [Zope-dev] Vulnerability in Zope > > Do others consider this a vulnerability? > > Yup... especially given the hard-coded (sigh) error page returned for > authentication error gives out this information :-( > > Chris > > > > ___ > Zope-Dev maillist - [EMAIL PROTECTED] > http://lists.zope.org/mailman/listinfo/zope-dev > ** No cross posts or HTML encoding! ** > (Related lists - > http://lists.zope.org/mailman/listinfo/zope-announce > http://lists.zope.org/mailman/listinfo/zope ) > ___ Zope-Dev maillist - [EMAIL PROTECTED] http://lists.zope.org/mailman/listinfo/zope-dev ** No cross posts or HTML encoding! ** (Related lists - http://lists.zope.org/mailman/listinfo/zope-announce http://lists.zope.org/mailman/listinfo/zope )
Re: [Zope-dev] Vulnerability in Zope
> Do others consider this a vulnerability? Yup... especially given the hard-coded (sigh) error page returned for authentication error gives out this information :-( Chris ___ Zope-Dev maillist - [EMAIL PROTECTED] http://lists.zope.org/mailman/listinfo/zope-dev ** No cross posts or HTML encoding! ** (Related lists - http://lists.zope.org/mailman/listinfo/zope-announce http://lists.zope.org/mailman/listinfo/zope )
Re: [Zope-dev] Vulnerability in Zope
On Sun, Sep 23, 2001 at 10:36:33AM -0400, Paul Everitt wrote: > > Do others consider this a vulnerability? While it reveals more > information than people might want, I'm curious about scenarios under > which it could be exploited. > > If any of you know of something *specific*, meaning it's a genuinely > exploitable vulnerability, please email me or Brian Lloyd > ([EMAIL PROTECTED]) directly, rather than explain to the world how to do it. > ... > ... > > Bobo-Exception-File: /usr/local/base/Zope-2.3.2-modified/lib/python/OFS/Property Think about social engeniering. Knowing this sort of things, while this is not a vulnerability in itself, allows everybody to remotely know were Data.fs is. bye, Jerome Alet ___ Zope-Dev maillist - [EMAIL PROTECTED] http://lists.zope.org/mailman/listinfo/zope-dev ** No cross posts or HTML encoding! ** (Related lists - http://lists.zope.org/mailman/listinfo/zope-announce http://lists.zope.org/mailman/listinfo/zope )
Re: [Zope-dev] Vulnerability in Zope
Do others consider this a vulnerability? While it reveals more information than people might want, I'm curious about scenarios under which it could be exploited. If any of you know of something *specific*, meaning it's a genuinely exploitable vulnerability, please email me or Brian Lloyd ([EMAIL PROTECTED]) directly, rather than explain to the world how to do it. --Paul ALife wrote: > Found vulnerability: retrieve a full path to local files in Zope. > > ---[ Example 1 (Linux): > > telnet www.zope.org 80 > > PROPFIND / HTTP/1.0 > > F > G > H > J > K > L > HTTP/1.0 500 Internal Server Error > Server: Zope/Zope 2.3.2 (source release, python 1.5.2, linux2) ZServer/1.1b1 > Date: Mon, 10 Sep 2001 15:38:59 GMT > Content-Length: 7058 > Ms-Author-Via: DAV > Bobo-Exception-File: /usr/local/base/Zope-2.3.2-modified/lib/python/OFS/Property > Sheets.py > Bobo-Exception-Type: TypeError > Content-Length: 7058 > Ms-Author-Via: DAV > Bobo-Exception-File: /usr/local/base/Zope-2.3.2-modified/lib/python/OFS/Property > Sheets.py > Bobo-Exception-Type: TypeError > Content-Type: text/html > Bobo-Exception-Value: EN" "http://www.w3.org/TR/REC-html40/loose.dtd";> Welcome > to Zope.org http://www.zope.org/zope_css"; > type="text/css"> Bobo-Exception-Line: 369 > > > ... > > > > Host has closed connection. > > ---[ Example 2 (Linux): > telnet www.zope.com 80 > > / HTTP/1.0 > or NOTREALCOMMAND / HTTP/1.0 > > > HTTP/1.0 404 Not Found > Server: Zope/Zope 2.3.2 (source release, python 1.5.2, linux2) ZServer/1.1b1 > Date: Fri, 21 Sep 2001 12:51:48 GMT > Bobo-Exception-File: /usr/local/base/Zope-2.3.2-modified/lib/python/ZPublisher/H > TTPResponse.py > Content-Type: text/html > Bobo-Exception-Type: NotFound > Bobo-Exception-Value: EN" "http://www.w3.org/TR/REC-html40/loose.dtd";> Welcome > to Zope.org http://www.zope.org/zope_css"; > type="text/css"> Content-Length: 5845 > Bobo-Exception-Line: 547 > > < ... > > > > Host has closed connection. > > > ---[ Example 3 (Win32): > > OPTIONS / HTTP/1.0 > or NOTREALCOMMAND / HTTP/1.0 > > HTTP/1.0 404 Not Found > Server: Zope/Zope 2.3.2 (binary release, python 1.5.2, win32-x86) ZServer/1.1b1 > Date: Mon, 10 Sep 2001 15:06:43 GMT > Bobo-Exception-File: D:\INSTOC~1\lib\python\webdav\NullResource.py > Bobo-Exception-Type: Not Found > Content-Type: text/html > Location: http://SERVERNAME > Bobo-Exception-Value: bobo exception > Content-Length: 756 > Bobo-Exception-Line: 122 > > :: > > Îøèáêà! > Î > øèáêà ïðè ïîïûòêå îïóáëèêîâàòü ðåñóðñ. > > > > Host has closed connection. > > > ___ > Zope-Dev maillist - [EMAIL PROTECTED] > http://lists.zope.org/mailman/listinfo/zope-dev > ** No cross posts or HTML encoding! ** > (Related lists - > http://lists.zope.org/mailman/listinfo/zope-announce > http://lists.zope.org/mailman/listinfo/zope ) > ___ Zope-Dev maillist - [EMAIL PROTECTED] http://lists.zope.org/mailman/listinfo/zope-dev ** No cross posts or HTML encoding! ** (Related lists - http://lists.zope.org/mailman/listinfo/zope-announce http://lists.zope.org/mailman/listinfo/zope )