public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* Re: Request to merge: new-updxlrtr-v3.0: Enabling GET-Params for %xlrtrsettings
       [not found] <CAAiW7AcJw4j9MfnZVjoZ3pg02t1udXPCfR0xHU-p9XS6s8Xk+w@mail.gmail.com>
@ 2013-04-26 10:35 ` Michael Tremer
  0 siblings, 0 replies; 2+ messages in thread
From: Michael Tremer @ 2013-04-26 10:35 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1140 bytes --]

On Thu, 2013-04-25 at 13:55 +0200, Jörn-Ingo Weigert wrote:
> I'm not really happy about re-implementing basic Features of HTML via
> JS,
> just cause of a limited processing (and thats what this return if...
> is)

No, it is a lot easier to make this kind of attack - without JS. All the
JS interpreters in modern browsers have a restriction that they cannot
send requests across different domains. That does not count for image
URL, etc.

For example the following code would indeed work:
 <img src="https://192.168.1.1:444/cgi-bin/exploitable.cgi?blah=blubb" ...>

You cannot send POST requests that easy.

> Sure, if there is a better solution to only on GET and POST methods it
> would be great to implement

My proposal would be to create a new function which only reads the query
string and returns a hash array with all the attributes that you want to
have. All the rest is ignored. For example:

# URL: https://192.168.1.1:444/cgi-bin/some.cgi?param1=123
my @values = ("param1");
my %hash = getquerystring(@values);
print $hash{'param1'};
> 123

This leaves getcgihash untouched, so we don't create new problems here.

-Michael



^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: Request to merge: new-updxlrtr-v3.0: Enabling GET-Params for %xlrtrsettings
       [not found] <CAAiW7AdWAdBvkLqNGjcE0MLp-LqhP_T2rjRpktdSBRurjfzfWA@mail.gmail.com>
@ 2013-04-25 10:29 ` Michael Tremer
  0 siblings, 0 replies; 2+ messages in thread
From: Michael Tremer @ 2013-04-25 10:29 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 784 bytes --]

Hey,

I think the original intention to filter for POST requests is to prevent
cross-site scripting issues. However, it is not a huge problem to create
a POST request with JS.

I am still not convinced that we should remove this line. It makes XSS
attacks more easy and therefore more dangerous.

For what exactly is this modification required?

-Michael

On Wed, 2013-04-24 at 18:22 +0200, Jörn-Ingo Weigert wrote:
> This add GET-Parameters for xlrtrsettings in header.pl
> 
> 
> http://git.ipfire.org/?p=people/jiweigert/ipfire-2.x.git;a=commit;h=b836edd0511e2cfc807292ff84322e71aa2dd7ec
> 
> _______________________________________________
> Development mailing list
> Development(a)lists.ipfire.org
> http://lists.ipfire.org/mailman/listinfo/development


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2013-04-26 10:35 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <CAAiW7AcJw4j9MfnZVjoZ3pg02t1udXPCfR0xHU-p9XS6s8Xk+w@mail.gmail.com>
2013-04-26 10:35 ` Request to merge: new-updxlrtr-v3.0: Enabling GET-Params for %xlrtrsettings Michael Tremer
     [not found] <CAAiW7AdWAdBvkLqNGjcE0MLp-LqhP_T2rjRpktdSBRurjfzfWA@mail.gmail.com>
2013-04-25 10:29 ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox