WebApp Sec mailing list archives
Re: Security using Apache module
From: chorn () chorn com
Date: Thu, 18 Mar 2004 09:45:06 -0500
On 2004/03/18 11:15:16 +0530, stevenr () mastek com wrote:
I have a web based J2EE application hosted on one box(Box1) and a web-based report-generating server on another box (Box2). Both Box1 and Box2 talk to a common DB. A user logs into Box1 and is authenticated and the server stores a session id in a cookie. Then a link from the application points to Box2 and fetches a dynamically-generated report in PDF format by passing required parameters in the URL to Box2. Problem: There is no session-related connection from Box1 and Box2. The reports application is a 3rd party tool, the only common point between the two boxes being that they talk HTTP using the Apache server ( version 1.3, fyi ). So it is possible for a user to craft the URL pointing to Box2 and circumvent Box1 altogether.
Writing an apache module to prevent this seems like a lot of extra work. Since Box2 is also running Apache, why not just limit access to Box1? Depending on how the report software is accessed, you could limit only access to that. In .htaccess or <Directory> block: Order deny,allow Deny from all Allow from Box1
Current thread:
- Security using Apache module stevenr (Mar 18)
- Re: Security using Apache module chorn (Mar 18)
- Re: Security using Apache module Ivan Ristic (Mar 18)
- <Possible follow-ups>
- RE: Security using Apache module stevenr (Mar 18)
- Re: Security using Apache module Ivan Ristic (Mar 19)
- RE: Security using Apache module Calderon, Juan Carlos (GE Commercial Finance, NonGE) (Mar 19)