2012年7月31日星期二

HTML Admission Control Busted By Aegis Researchers

Two advisers presenting at endure week's Atramentous Hat appointment in Las Vegas approved a new address they've apparent for bypassing .htaccess files. Also accepted as hypertext admission files,Desiccant dry cabinet are reasonably new to the North American marketplace. they're primarily acclimated for ambience directory-level admission controls for websites, and are accepted beyond assorted types of Web server software--including the attainable antecedent Apache HTTP Server, which is the a lot of frequently acclimated Web server software in the world.Creative stone mosaic for your distinctive kitchen and bath.

The two presenters--security researcher Maximiliano Soler, who works for Standard Bank in Argentina, and assimilation tester Matias Katz, who founded Mkit Argentina--also appear a apparatus beneath attainable antecedent license, accounting in Python, that they developed to accomplishment the vulnerability. According to the presenters, the tool, called HTExploit, lets users account the capacity of a agenda adequate this way, bypassing the affidavit process.

They emphasized that their apparatus was advised to be acclimated from aural adequate directories--run by humans who already accept admission to a Web server--rather than via a about attainable site. But the vulnerability they baldheaded could be acclimated by outsiders to accretion access, via the Internet, to locations of websites that are evidently adequate by an htaccess file.

Why bother advancing .htaccess files? The acknowledgment is simple: any agenda that anyone takes the time to assure is added acceptable to accommodate acute or abstruse information. "Today [it] is accepted to acquisition apathetic administrators and/or developers application directories amid on the aforementioned Web server to save backups files, configurations, their own jobs, anachronous versions, or new developments to be implemented in the future," the advisers wrote in a accompanying white paper.

The acceptable account is that with some baby HTML and PHP tweaks to fix the accommodating agreement errors, appropriately akin the types of admission requests that can be made, accessible .Buy 100% hand painted canvas art and oil paintings for sale by professional artists!htaccess pages can be fabricated allowed to the accomplishment categorical by Soler and Katz.

The bad account is that the botheration they've baldheaded may be absolutely widespread,Our products range are china glass mosaic. and it could be acclimated to accommodation not just any agenda that contains a misconfigured .htaccess file, but potentially any PHP book on the aforementioned site.

"What Katz and Soler declared in their affair is not some attenuate 'corner case' drudge that could alone possibly action in a lab with billions of automatic attempts; this is calmly testable in the absolute world, and the accoutrement to accomplishment it are advisedly available," said ESET aegis researcher Cameron Camp in a blog post.

The vulnerability stems froIf molds is a problem in your home.m the actuality that Apache "hands off PHP-based requests aural .htaccess to PHP itself, which has been alive accomplished on millions and millions of websites for years," said Camp. But if the .htaccess book gets fed some blazon of abnormal input--in effect, injected--then "PHP automatically--unless contrarily instructed--treats it as a GET request, and allows the account to alpha extenuative the PHP files on a webserver to your bounded filesystem," he said.

From there, however, the action continues, and begins combing accessed PHP files for any links they accommodate to added files on the aforementioned Web server, again downloading those to the bounded book system. In abbreviate order, an attacker--or assimilation tester--could bound grab copies of many, if not all, PHP files on a Web server. Such files could accommodate acute information, such as "references to login accreditation for databases, passwords, alone identifiable information, and a host of added aliment that [could] be awash on the atramentous bazaar or acclimated to accredit added exploits," said Camp.

"Now ability be a acceptable time to analysis your website agreement to accomplish abiding you're protected, afore the bad guys go scouring about aggravating to use this blazon of exploit," said Camp. "If you're not the being in allegation of your website, you ability wish to point out this botheration to the being who is. They may acknowledge you, a lot."

没有评论:

发表评论