Re: [squid-users] filtering new IE exploit

From: Antony Stone <Antony@dont-contact.us>
Date: Thu, 11 Dec 2003 15:29:02 +0000

On Thursday 11 December 2003 3:07 pm, DB wrote:

> I saw a new IE exploit descibed as follows:
>
> ---------------------
> http://www.secunia.com/advisories/10395/
>
> Example displaying only "http://www.trusted_site.com" in the address bar
> when the real domain is "malicious_site.com":
> http://www.trusted_site.com%01@malicious_site.com/malicious.html
> --------------------
>
> I'm trying to use an acl to prevent access to such urls. I tried this:
>
> acl ieflaw url_regex %01@
>
> and
>
> http_access deny ieflaw
>
> but this doesn't seem to do anything at all

This is a bit of a guess, but you might need to escape one or two of those
characters?

acl ieflaw url_regex \%01\@

should be safe.

Also, from a discussion on another mailing list, I believe the exploit is
still effective:

a) with one or more characters between the %01 and the @ (I don't know if
there's an upper limit to how many can be instered)

b) with certain other non-printable characters in place of the %01

Antony.

-- 
There are two possible outcomes:
 If the result confirms the hypothesis, then you've made a measurement.
 If the result is contrary to the hypothesis, then you've made a discovery.
 - Enrico Fermi
                                                     Please reply to the list;
                                                           please don't CC me.
Received on Thu Dec 11 2003 - 08:29:13 MST

This archive was generated by hypermail pre-2.1.9 : Thu Jan 01 2004 - 12:00:10 MST