[問題]資安弱掃遇到的問題Same site scripting

作者: luckdavid (茶米)   2015-12-09 13:11:37
各位先進大家好,我遇到一個問題解不掉想請大家幫幫忙。
以下是弱掃報告:
Severity:Medium
Type:Configuration
Reported by module :Scripting (Subdomain_Takeover.script)
Description:Tavis Ormandy reported a common DNS misconfiguration that can
result in a minor security issue with web applications. "It's a common
and sensible practice to install records of the form "localhost.
IN A 127.0.0.1" into nameserver configurations, bizarrely however,
administrators often mistakenly drop the trailing dot, introducing an
interesting variation of Cross-Site Scripting (XSS) I call Same-Site
Scripting. The missing dot indicates that the record is not fully qualified,
and thus queries of the form "localhost.example.com" are resolved.
While superficially this may appear to be harmless, it does in fact allow
an attacker to cheat the RFC2109 (HTTP State Management Mechanism) same
origin restrictions, and therefore hijack state management data."
Impact:An attacker can cheat the RFC2109 (HTTP State Management Mechanism)
same origin restrictions, and therefore hijack state management data.
Recommendation:It is advised that non-FQ localhost entries be removed from
nameserver configurations for domains that host websites that rely on HTTP
state management.
拜託了。。。
作者: LPH66 (-6.2598534e+18f)   2015-12-09 15:42:00
DNS 設定, 有一個 A 記錄 localhost 應在其後加一個點不加的話攻擊者可以用 localhost.example.com 來繞過example.com 上面的 XSS 限制或者就乾脆把這條 A 記錄給拿掉, 這樣 localhost 這個名字不經過 DNS 就不會有這個問題
作者: threeus (侍衛)   2015-12-10 18:48:00
高手在人間

Links booklink

Contact Us: admin [ a t ] ucptt.com