Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+5g0SKE=J8m=P2FsXk8HdzJdxwAxXVa-uVhPaD5eTUxAhLMnQ@mail.gmail.com>
Date: Fri, 14 Jun 2013 14:22:27 -0300
From: Felipe Pena <felipensp@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: Bypass protected directory by Monkey HTTPD - Mandril
 security plugin

Monkey HTTPD - Mandril security plugin
Mandril is a plugin which provides a security layer to Monkey through
rules which can be applied to the request URI or by network address.

A vulnerability was found in the way as the URI are validated. The plugin check
the configuration rules against possible encoded URIs.

PoC
---

Configuration sample:
[RULES]
Deny_URL /test/

To bypass such rule, we just need to make a request like:
http://yourhost/%2ftest/


Report
------
http://bugs.monkey-project.com/ticket/186


CREDITS
-------
Felipe Pena

--
Regards,
Felipe Pena

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.