Stefano,

On Tue, Jun 2, 2009 at 3:45 PM, Stefano Di Paola <wi...@wisec.it> wrote:
> Hi Andres,
> good finding, but if you were subscribed to my blog
> http://www.wisec.it/sectou.php
>  you'd see that I wrote about it a couple of years ago:
> http://www.wisec.it/sectou.php?id=4698ebdc59d15

hehe, nice!

> Obviously I'm just kidding,

=)

> every research is good research when you
> find it by yourself.

Well... I think that my email was mis-interpreted (by many people, so
I think that it was my problem). I didn't implied that I found this
"new" technique, I just wanted to say that I (Andrés Riancho) found
out about it. I actually got this technique from a commercial web app
sec scanner that I was analyzing :)

I'm in the process of starting to write a w3af plugin to exploit this
issue, do you know if there is any previous research / paper /
something done around this vulnerability that I should quote in the
plugin source code? (other than yours)

> BTW that finding gave me the chance to find an Xss
> and response splitting on Apache:
> http://www.mindedsecurity.com/MSA01150108.html

Nice finding, but kind of hard to exploit in real life.

> and _I think_ it's still marked as "won't fix".

That sucks :S

Cheers,

> Cheers,
> Stefano
>
> Il giorno mar, 02/06/2009 alle 10.10 -0300, Andres Riancho ha scritto:
>> List,
>>
>>     Yesterday I found out a new trick, and I would like to share it with you 
>> ;)
>>
>> HTTP Request
>> ========
>>
>> GET /backup HTTP/1.0
>> Accept: foobar/xyz
>> User-Agent: w3af
>> Host: 192.168.150.2
>> Connection: Close
>>
>> HTTP Response
>> =========
>>
>> HTTP/1.1 406 Not Acceptable
>> ...
>> <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
>> <html><head>
>> <title>406 Not Acceptable</title>
>> </head><body>
>> <h1>Not Acceptable</h1>
>> <p>An appropriate representation of the requested resource /backup
>> could not be found on this server.</p>
>> Available variants:
>> <ul>
>> <li><a href="backup.tgz">backup.tgz</a> , type application/x-gzip</li>
>> <li><a href="backup.zip">backup.zip</a> , type application/zip</li>
>> </ul>
>> <hr>
>> <address>Apache/2.2.8 (Ubuntu) DAV/2 mod_python/3.3.1 Python/2.5.2
>> PHP/5.2.4-2ubuntu5.6 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g
>> Server at 192.168.150.2 Port 80</address>
>> </body></html>
>>
>> In the response, please note these lines:
>>
>> <li><a href="backup.tgz">backup.tgz</a> , type application/x-gzip</li>
>> <li><a href="backup.zip">backup.zip</a> , type application/zip</li>
>>
>> And if we go to the webroot to verify...
>>
>> d...@brick:/var/www$ ls -la | grep backup
>> -rw-r--r--  1 dz0 dz0       0 2009-06-01 22:02 backup.tgz
>> -rw-r--r--  1 dz0 dz0       0 2009-06-01 22:03 backup.zip
>> d...@brick:/var/www$
>>
>> This trick is really useful when finding (for example) backup files,
>> because you won't need to ask for backup.zip, backup.7z, backup.bzip2,
>> backup.tar.gz , etc. You just ask apache for the backup file, with an
>> incorrect Accept header (please note Accept: foobar/xyz) and that's
>> it, a list of given back to you.
>>
>> If this ain't new for you, sorry, but it was new for me =)
>>
>> I'm still thinking how I can use this trick in w3af, because I may use
>> it as part of a discovery plugin, or maybe as an audit plugin that
>> finds this as a vulnerability, and code an attack plugin that can
>> exploit it to bruteforce new resources... hmmm... I still have to
>> think. What do you guys think?
>>
>> Cheers,
>
>



-- 
Andrés Riancho
Founder, Bonsai - Information Security
http://www.bonsai-sec.com/
http://w3af.sf.net/

------------------------------------------------------------------------------
OpenSolaris 2009.06 is a cutting edge operating system for enterprises 
looking to deploy the next generation of Solaris that includes the latest 
innovations from Sun and the OpenSource community. Download a copy and 
enjoy capabilities such as Networking, Storage and Virtualization. 
Go to: http://p.sf.net/sfu/opensolaris-get
_______________________________________________
W3af-users mailing list
W3af-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to