Apologies for starting a new thread; I just subscribed.
Has anyone been able to make this exploit happen if requests are being
proxied to Mongrel through Apache? I’ve been trying variations on the
double-encoding thing and can’t trigger the exploit through Apache.
Hitting Mongrel directly does expose the problem.
I’ll still upgrade my servers, of course, but I don’t want to send an
unnecessary “upgrade now” note to other folks…
Apologies for starting a new thread; I just subscribed.
Has anyone been able to make this exploit happen if requests are being
proxied to Mongrel through Apache? I’ve been trying variations on the
double-encoding thing and can’t trigger the exploit through Apache.
Hitting Mongrel directly does expose the problem.
Yeah Tom, using a proxy/balancer like apache and nginx will filter
this, but some folks serve mongrel directly, or using not-so-clever
balancers that didn’t filter this kind of exploits.
I’ll still upgrade my servers, of course, but I don’t want to send an
unnecessary “upgrade now” note to other folks…
Most common use of mongrel is “behind a proxy or balancer”, so I only
see development servers is being affected by this.
Or, maybe I’m wrong (which happens quite often).
–
Luis L.
Multimedia systems
A common mistake that people make when trying to design
something completely foolproof is to underestimate
the ingenuity of complete fools.
Douglas Adams
Apologies for starting a new thread; I just subscribed.
Has anyone been able to make this exploit happen if requests are being
proxied to Mongrel through Apache? I’ve been trying variations on the
double-encoding thing and can’t trigger the exploit through Apache.
Hitting Mongrel directly does expose the problem.
I’ll still upgrade my servers, of course, but I don’t want to send an
unnecessary “upgrade now” note to other folks…
I think others said it, but I’ll lay out the conditions for what is the
most likely upgrade requirement:
If you use nginx or apache (and maybe other full web servers with a
proxy module) then you can wait to upgrade, but probably not very
long. This is because these servers do their own checking as well, and
are handling your files. That means a request for the file will be
dropped, and blocked.
If you use a pure TCP/IP based proxy balancer (balance, pen,
swiftiply?) then you must upgrade as these do no checks on the incoming
TCP packets.
If you use mongrel directly to serve content then you must upgrade.
If you cannot upgrade, see the list earlier for the one line fix. You
don’t need the comments
If you use nginx or apache (and maybe other full web servers with a
proxy module) then you can wait to upgrade, but probably not very
long. This is because these servers do their own checking as well, and
are handling your files. That means a request for the file will be
dropped, and blocked.
GET to //.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/etc/passwd not supported.
Apache/2.0.x (RHEL) Server at host.domain.it Port 80
that means that modsecurity stops the request before it hits Apache.
Don’t know if Apache would stop it by itself, just to suggest that
this extra layer of security could be added for free and it does not
interfere with Rails application we’ve here.