View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0004283 | unreal | ircd | public | 2014-03-14 01:14 | 2014-03-14 01:14 |
Reporter | peterkingalexander | Assigned To | |||
Priority | high | Severity | major | Reproducibility | always |
Status | resolved | Resolution | fixed | ||
Product Version | 3.2.10.1 | ||||
Fixed in Version | 3.4-alpha1 | ||||
Summary | 0004283: CAP Negotiation can be used to bypass PING cookie | ||||
Description | Summary says it all really but basically a client can send CAP LS, NICK, USER, CAP END and not have to send PONG <cookie> to connect. Allowing malicious code to bypass the PING cookie IP spoof protection. | ||||
Steps To Reproduce | telnet <server> 6667 CAP LS NICK SomeNick USER User meh meh :Gecos CAP END *connected* | ||||
Tags | No tags attached. | ||||
3rd party modules | |||||
|
Fortunately 99% of the people run OS's that have no (known) weak ISN. Still, this also means HTTP POST protection can be bypassed, oh well.. actually not.. because that's caught by another module ;p. Still.. should be fixed. nenolod? you added the code, so you probably know where the problem lies. Btw, I would swear I tested this, because it was so logical that this would happen :p. |
|
Confirmed. I think it should be fixed out of principle if nothing else, its still a weakness even if it is minor. My 2ยข :) |
|
http://hg.unrealircd.com/hg/unreal/rev/0d8f213feb59 |
Date Modified | Username | Field | Change |
---|---|---|---|
2014-03-14 01:14 | peterkingalexander | New Issue | |
2014-03-14 01:14 | peterkingalexander | Issue generated from: 0004222 |