Hi Vint,

see my comments/answers inline.

Achim


Am 16.05.2013 18:12, schrieb Vint Surf:
> Responses in-line.  Thanks!
> 
>> I'm thinking in order to determine if HTTP host header can be exploited,
> we
>> would need to:
>> A) determine if SERVER_NAME, HTTP_HOST, or both have values
>> B) verify the URI to see if the SERVER_NAME and HTTP_HOST match?
>> C) Determine if there are wildcard entries for SERVER_NAME
> 
>> Lets move one step back, what do you mean by SERVER_NAME?
> 
> SERVER_NAME would be the server included in the POST command?

no!
SERVER_NAME ist the name as defined by the web server's configuration.
I.e. in apache's httpd.conf the ServerName variable, if not set it contains
what the Host: header contains.

> i.e. POST https://addons.mozilla.org/en-US

> So maybe send a POST with the valid server_name but with a random HOST
> header and see if a response is returned?  If so, I guess this can be
> exploited?

Yes, that's a test for that.
But keep in mind that different web servers may behave different here.
Unfortunately I don't have more details.
You need at least 4 tests:
        1. non-malicious one
                POST http://good.tld/path
                Host: good.tld

        2. malicious
          a)    POST http://good.tld/path
                Host: evil.tld

          b)    POST http://evil.tld/path
                Host: good.tld

          c)    POST http://evil.tld/path
                Host: evil.tld

BTW, if such a POST request works, it's also an open relay.

Other web servers may use different configurations (see apache above) and
behave different.


>> Also, is HTTP_HOST the host header send in a request? If so, we
> control that and we can set it or not.
> 
> Yes, I was referring to the malicious host also sent in a request.
> 
>> I believe a curl request can be created to verify the above?
> 
> Lets forget about the how for a while, first lets understand the
> problem and the algorithm to identify it,
> 
> 
> 
>> I apologize if this is not the right solution, but would appreciate any
>> assistance.  Thanks!
> 
> No reason to apologize! We all need to learn about these new
> vulnerabilities,
> 
> PD: Can we take this conversation back to w3af-develop ?


------------------------------------------------------------------------------
AlienVault Unified Security Management (USM) platform delivers complete
security visibility with the essential security capabilities. Easily and
efficiently configure, manage, and operate all of your security controls
from a single console and one unified framework. Download a free trial.
http://p.sf.net/sfu/alienvault_d2d
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to