Bugtraq mailing list archives
Re: [Full-disclosure] SEC-Consult SA 20051025-0 :: Snoopy Remote Code Execution Vulnerability
From: Florian Weimer <fw () deneb enyo de>
Date: Thu, 27 Oct 2005 10:12:37 +0200
* Bernhard Mueller:
While the vulnerability can not be exploited using the Snoopy class file itself, there may exist implementations which hand unchecked URLs from users to snoopy.
Thanks for the notice. Have you considered in your analysis that malicious servers might return HTTP redirects which contain suitable URLs? This requires that the offsiteok member is set to true, though, because in the version I looked at, only http:// URLs are considered site-local. (Note: I haven't tried to exploit this, I just browsed the code.)
Current thread:
- SEC-Consult SA 20051025-0 :: Snoopy Remote Code Execution Vulnerability Bernhard Mueller (Oct 25)
- Re: [Full-disclosure] SEC-Consult SA 20051025-0 :: Snoopy Remote Code Execution Vulnerability Florian Weimer (Oct 29)
- Re: [Full-disclosure] SEC-Consult SA 20051025-0 :: Snoopy Remote Code Execution Vulnerability SEC Consult Research (Oct 29)
- Re: [Full-disclosure] SEC-Consult SA 20051025-0 :: Snoopy Remote Code Execution Vulnerability Florian Weimer (Oct 29)