Complete.Org: Mailing Lists: Archives: freeciv-dev: May 2002:
[Freeciv-Dev] Re: [Metaserver] scripting security hole (PR#1424)
Home

[Freeciv-Dev] Re: [Metaserver] scripting security hole (PR#1424)

[Top] [All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index] [Thread Index]
To: freeciv-dev@xxxxxxxxxxx
Cc: bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Freeciv-Dev] Re: [Metaserver] scripting security hole (PR#1424)
From: Reinier Post <rp@xxxxxxxxxx>
Date: Thu, 2 May 2002 02:11:36 -0700 (PDT)

On Wed, May 01, 2002 at 10:29:47AM -0700, Stefan Schnetter wrote:
> > This is causing the browser to make a request for the file, so you will
> > only be able to force it to grab files it can already grab.
> You can readout e.g. Mozilla stored password file (or something else) of
> every visitor and send it anywhere. My test exploit just display files (and it
> dont work because it dont execute local).
>  
> > The metaserver shouldn't allow tags, but this isn't a security problem.
> I am not a script kiddie or a security expert so i dont know an other
> exploit that can really make damage.
> 
> It is possible to abuse it and if someone knows a danger exploit e.g. that
> access server files - then it is a security problem.

Nothing gets executed on the server.  The problem is on the client end.

As a workaround we can disallow/escape HTML in /metainfo strings
as you suggest, or even add a /metaurl command to support URLs.

-- 
Reinier



[Prev in Thread] Current Thread [Next in Thread]