View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0004222 | unreal | ircd | public | 2013-06-19 19:23 | 2013-09-21 08:08 |
Reporter | Jobe | Assigned To | |||
Priority | high | Severity | major | Reproducibility | always |
Status | resolved | Resolution | fixed | ||
Product Version | 3.2.10.1 | ||||
Fixed in Version | 3.4-alpha1 | ||||
Summary | 0004222: CAP Negotiation can be used to bypass PING cookie | ||||
Description | Summary says it all really but basically a client can send CAP LS, NICK, USER, CAP END and not have to send PONG <cookie> to connect. Allowing malicious code to bypass the PING cookie IP spoof protection. | ||||
Steps To Reproduce | telnet <server> 6667 CAP LS NICK SomeNick USER User meh meh :Gecos CAP END *connected* | ||||
Tags | No tags attached. | ||||
3rd party modules | |||||
|
Fortunately 99% of the people run OS's that have no (known) weak ISN. Still, this also means HTTP POST protection can be bypassed, oh well.. actually not.. because that's caught by another module ;p. Still.. should be fixed. nenolod? you added the code, so you probably know where the problem lies. Btw, I would swear I tested this, because it was so logical that this would happen :p. |
|
Confirmed. I think it should be fixed out of principle if nothing else, its still a weakness even if it is minor. My 2ยข :) |
|
http://hg.unrealircd.com/hg/unreal/rev/0d8f213feb59 |
Date Modified | Username | Field | Change |
---|---|---|---|
2013-06-19 19:23 | Jobe | New Issue | |
2013-06-26 20:24 | syzop | Note Added: 0017719 | |
2013-08-05 02:13 | wolfwood | Note Added: 0017738 | |
2013-08-15 21:48 | syzop | Status | new => acknowledged |
2013-09-21 08:08 |
|
Note Added: 0017767 | |
2013-09-21 08:08 |
|
Status | acknowledged => resolved |
2013-09-21 08:08 |
|
Fixed in Version | => 3.4-alpha1 |
2013-09-21 08:08 |
|
Resolution | open => fixed |
2013-09-21 08:08 |
|
Assigned To | => nenolod |
2014-03-14 01:14 | peterkingalexander | Issue cloned: 0004283 |