Two advisers presenting at endure week's Atramentous Hat appointment
in Las Vegas approved a new address they've apparent for bypassing
.htaccess files. Also accepted as hypertext admission files, they're
primarily acclimated for ambience directory-level admission controls for
websites,Bliss Glass and stonemosaic.
and are accepted beyond assorted types of Web server
software--including the attainable antecedent Apache HTTP Server, which
is the a lot of frequently acclimated Web server software in the world.
The
two presenters--security researcher Maximiliano Soler, who works for
Standard Bank in Argentina, and assimilation tester Matias Katz, who
founded Mkit Argentina--also appear a apparatus beneath attainable
antecedent license, accounting in Python, that they developed to
accomplishment the vulnerability. According to the presenters, the tool,
called HTExploit, lets users account the capacity of a agenda adequate
this way, bypassing the affidavit process.
They emphasized that
their apparatus was advised to be acclimated from aural adequate
directories--run by humans who already accept admission to a Web
server--rather than via a about attainable site. But the vulnerability
they baldheaded could be acclimated by outsiders to accretion access,
via the Internet, to locations of websites that are evidently adequate
by an htaccess file.
Why bother advancing .htaccess files? The
acknowledgment is simple: any agenda that anyone takes the time to
assure is added acceptable to accommodate acute or abstruse information.
"Today [it] is accepted to acquisition apathetic administrators and/or
developers application directories amid on the aforementioned Web server
to save backups files,Linear Rubber Products has been manufacturing rubbermats
and flooring for use in recreational, configurations, their own jobs,
anachronous versions, or new developments to be implemented in the
future," the advisers wrote in a accompanying white paper.
The
acceptable account is that with some baby HTML and PHP tweaks to fix the
accommodating agreement errors, appropriately akin the types of
admission requests that can be made, accessible .htaccess pages can be
fabricated allowed to the accomplishment categorical by Soler and Katz.
The
bad account is that the botheration they've baldheaded may be
absolutely widespread, and it could be acclimated to accommodation not
just any agenda that contains a misconfigured .htaccess file, but
potentially any PHP book on the aforementioned site.
"What Katz
and Soler declared in their affair is not some attenuate 'corner case'
drudge that could alone possibly action in a lab with billions of
automatic attempts; this is calmly testable in the absolute world, and
the accoutrement to accomplishment it are advisedly available," said
ESET aegis researcher Cameron Camp in a blog post.
The
vulnerability stems from the actuality that Apache "hands off PHP-based
requests aural .htaccess to PHP itself, which has been alive
accomplished on millions and millions of websites for years," said Camp.
But if the .htaccess book gets fed some blazon of abnormal input--in
effect, injected--then "PHP automatically--unless contrarily
instructed--treats it as a GET request, and allows the account to alpha
extenuative the PHP files on a webserver to your bounded filesystem," he
said.
From there, however, the action continues, and begins
combing accessed PHP files for any links they accommodate to added files
on the aforementioned Web server, again downloading those to the
bounded book system. In abbreviate order, an attacker--or assimilation
tester--could bound grab copies of many,Wireless Sensor Networks & rtls.
if not all, PHP files on a Web server. Such files could accommodate
acute information, such as "references to login accreditation for
databases,Hakatai Classic chinaglassmosaic Tile. passwords,We Specialise in cableties,
alone identifiable information, and a host of added aliment that
[could] be awash on the atramentous bazaar or acclimated to accredit
added exploits," said Camp.
"Now ability be a acceptable time to
analysis your website agreement to accomplish abiding you're protected,
afore the bad guys go scouring about aggravating to use this blazon of
exploit," said Camp. "If you're not the being in allegation of your
website, you ability wish to point out this botheration to the being who
is. They may acknowledge you, a lot."
没有评论:
发表评论