On Tue, Jan 20, 2009 at 6:57 PM, 3BUIb3S50i 3BUIb3S50i
<3buib3s50i at gmail.com> wrote:
> SomeDude wrote:
>
>> What version(s) of fms were these fixed in?
>>
>
> Captcha validation was introduced in 0.2.23, but there was code to limit
> the mime type to 50 characters back in 0.1.10.
>
> As far as the format strings, I suppose he's talking about the old log
> file class. It was removed in 0.3.0.
>
>> How was this used to collect IP addresses? Can someone explain the
>> mechanism in more detail? What does it mean by "redirects" - Freenet
>> redirects? Or HTTP redirects?
>
> HTTP redirect. Each response from the HTTP server has header info in
> it. The headers specify things like content type and data length. Each
> header is separated by a newline, and from the actual data by 2
> newlines. FMS wasn't validating the MIME type, so nextgens was able to
> put a newline in the mime type and add a location header that would
> cause the browser to request that location.
>
> Content-Type: image/bmp
> Location: http://www.nextgensevilsite.com
>
> My bad for not realizing it at the time. Nextgens bad for actively
> exploiting it without disclosing it to me first.

The source code i have on hand does check if this is image/bmp:
"src/freenet/introductionpuzzlerequester.cpp" line110

but i don't have the access to latest source code, nor do i have
access to freenet.

> On 1/20/09, Daniel Cheng <j16sdiz+freenet at gmail.com> wrote:
>> 2009/1/20 Matthew Toseland <toad at amphibian.dyndns.org>:
>>> On Monday 19 January 2009 19:42, Florent Daigni?re wrote:
>>>> * Matthew Toseland <toad at amphibian.dyndns.org> [2009-01-19 13:02:31]:
>>>>
>>>> > There were at least:
>>>> > - A lack of validation on the captchas page which enabled collecting
>>>> > users
>>> IP
>>>> > addresses. This involved putting newlines into the headers in order to
>>> send
>>>> > extra headers and in particular redirects, and was actively exploited
>>>> > by
>>>> > nextgens to collect IP addresses.
>>>>
>>>> Unless you can prove it that's defamation ;)
>>>
>>> Then I retract it ... but I'm fairly sure this bug is exploitable, that's
>>> the
>>> point. :)
>>
>> Not sure if you are seeing the same problem.
>> The only leak I am aware of is related to HTML injection, which is
>> fixable with a few lines of code.
>>
>> (Which I have never tell SomeDude....  If you know any off-the-freenet
>> way to send SomeDude
>>  message, please tell me........... for example: gpg-encrypted message
>> posted on pastebin? )
>>
>> Or do you means something  HTTP Request Smuggling-like?
>>
>> --
>> _______________________________________________
>> Tech mailing list
>> Tech at freenetproject.org
>> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
>>
>
>
> --
> 3buib3s50i at gmail.com | dimonqmfcb at gmx.com
> _______________________________________________
> Tech mailing list
> Tech at freenetproject.org
> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech

Reply via email to