I would assume just about any app with a shopping cart does. This is of course compounded by libraries like struts and spring mvc that autobind your form variables for you. Use a form with a double in it and your boned.
Sent from my iPwn On Feb 14, 2011, at 8:57 AM, "Wall, Kevin" <kevin.w...@qwest.com> wrote: > Jim Manico wrote... >> Rafal, >> >> It's not that tough to blacklist this vuln while you are waiting for your >> team to patch your JVM (IBM and other JVM's have not even patched yet). >> I've seen three generations of this filter already. Walk with me, Rafal and >> I'll show you. :) >> >> 1) Generation 1 WAF rule (reject one number only) >> >> This mod security rule only blocks a small portion of the DOSable range. >> The mod security team is working to improve this now (no disrespect meant >> at all!) >> >> SecRule ARGS|REQUEST_HEADERS "@contains 2.2250738585072012e-308" >> "phase:2,block,msg:'Java Floating Point DoS Attack',tag:'CVE-2010-4476'" >> >> Reference: http://mobile.twitter.com/modsecurity/status/35734652652093441 >> > > Depending how & when the exponent conversion is done, this mod_security rule > may be completely ineffective. For example, if an attacker can write this > floating point # as the equivalent > > 22.250738585072012e-309 > > (which note, I have not tested), then the test above is invalid. I presumed > that > this was why Adobe's blacklist *first* removed the decimal point. Adobe's > blacklist > could be generalized a bit to cover appropriate ranges with a regular > expression, > but I agree wholeheartedly with you that what you dubbed as the "Chess > Defense" > (I like it) is the best approach short of getting a fix from the vendor of > your > JRE. > > So on a somewhat related note, does anyone have any idea as to how common it > is for > application developers to call ServletRequest.getLocale() or > ServletRequest.getLocales() > for Tomcat applications? Just curious. I'm sure it's a lot more common than > developers using double-precision floating point in their applications (with > the possible exception within the scientific computing community). > > -kevin > --- > Kevin W. Wall Qwest Risk Mgmt / Information Security > kevin.w...@qwest.com Phone: 614.215.4788 > "It is practically impossible to teach good programming to students > that have had a prior exposure to BASIC: as potential programmers > they are mentally mutilated beyond hope of regeneration" > - Edsger Dijkstra, How do we tell truths that matter? > http://www.cs.utexas.edu/~EWD/transcriptions/EWD04xx/EWD498.html > > This communication is the property of Qwest and may contain confidential or > privileged information. Unauthorized use of this communication is strictly > prohibited and may be unlawful. If you have received this communication > in error, please immediately notify the sender by reply e-mail and destroy > all copies of the communication and any attachments. > > _______________________________________________ > Secure Coding mailing list (SC-L) SC-L@securecoding.org > List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l > List charter available at - http://www.securecoding.org/list/charter.php > SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) > as a free, non-commercial service to the software security community. > Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates > _______________________________________________ _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________