Re: [mod-security-users] PHP mail() header injection issues
Brought to you by:
victorhora,
zimmerletw
|
From: Ivan R. <iv...@we...> - 2005-12-16 18:51:59
|
li...@32... wrote: > on 12/16/05 11:50 AM, Ivan Ristic at iv...@we... wrote: > > >>>Thing that has me stuck is this, everytime I try to punch this string >>>into a sample "From:" field on a test form, when I print the string to >>>the screen it comes out exactly like that with the "%0A" and all. The >>>"%0A" is suppose to be converted into a "\n" which is needed of for the >>>exploit to work. Problem is that POST data does not get unencoded like >>>GET data on the other end and the PHP mail() just barfs. >>> >>>If I try to send the same string with plain old "\n" then it ends up >>>looking like this "\\n" on the other side because Magic Quotes is >>>escaping my backslash. >>> >>>I am confused as to how the SPAMMERS have been able to successfully pass >>>the "\n" which is needed in a POST when I can't do it myself. >> >> That's because you are trying to work it out through the browser. >> But if you access the form programmatically you can construct >> any content you like, replacing %0A (encoded \n with three characters) >> with only one character \n. >> >>-- >>Ivan Ristic > > > > Ivan, > > What would you recommend as a rule to thwart these attempts? How about something like (not tested in real life): SecFilterSelective ARGS_VALUES "\n[[:space:]]*(bcc:|cc:)" -- Ivan Ristic Apache Security (O'Reilly) - http://www.apachesecurity.net Open source web application firewall - http://www.modsecurity.org |