Re: squirrelmail CSRF vulnerability

看板Bugtraq作者時間18年前 (2007/05/11 04:04), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/5 (看更多)
On Thu, 10 May 2007 p3rlhax@gmail.com wrote: > IV. DETECTION > > Latest version of squirrel mail 1.4.8-4.fc6 and prior are found vulnerable. > > V. WORKAROUND > > I. Application should check for Referer Header in every post login request. Referer headers can be forged via Flash, so it is not a good idea to rely on these for security. > > II. Application should use CSRF token which is random enough to identify every legitimate post login request. According to: http://squirrelmail.org/security/issue/2006-12-02 version 1.4.8-4 is vulnerable to a XSS vulnerability, so an attacker could use the XSS vector to grab the session token ("CSRF token") and continue the CSRF attack. -- - Josh
文章代碼(AID): #16Gthb00 (Bugtraq)
文章代碼(AID): #16Gthb00 (Bugtraq)