Ravens PHP Scripts: Forums
 

 

View next topic
View previous topic
This forum is locked: you cannot post, reply to, or edit topics.   This topic is locked: you cannot edit posts or make replies.    Ravens PHP Scripts And Web Hosting Forum Index -> RN NukeSentinel(tm) issues
Author Message
CodyG
Life Cycles Becoming CPU Cycles



Joined: Jan 02, 2003
Posts: 714
Location: Vancouver Island

PostPosted: Thu Jan 17, 2008 4:46 am Reply with quote

Hi ...
We (our club webteam) are having a problem with regular users accessing our modified Feedback module. The link works fine if one is logged in as admin, but throws an unknown sentinel block if one is either a visitor or registered user.

name=FeedbackX&selector=contactExec

and the html looks like this:
The Executive Directors can be contacted as a group <a href="http://....org/modules.php?name=FeedbackX&amp;selector=contactExec">here </a>

Any ideas why this is happening? Might this have something to do with the Exe string? If so, is there a way I can allow exec???


You have been blocked from entering this site.

You have attempted an unknown access point on this site.

All of the following information has been gathered to assist the webmaster in resolving this issue.

If you think this is a mistake you can contact the site webmaster at ....

Be SURE to include the following information in any email!
User Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.8.1.11) Gecko/20071127 Firefox/2.0.0.11
Query String: name=FeedbackX&selector=contactExec
GET String: name=FeedbackX&selector=contactExec
POST String:
Referer: none
Request Method: GET
Remote Address: xx.xx.xx.xxx
Client IP: none
Forwarded For: none
Date Blocked: 2008-01-17 @ 02:29:18 PST GMT -0800
Block expires: Permanent

_________________
"We want to see if life is ubiquitous." D.Goldin 
View user's profile Send private message
evaders99
Former Moderator in Good Standing



Joined: Apr 30, 2004
Posts: 3221

PostPosted: Thu Jan 17, 2008 8:10 am Reply with quote

Pretty sure its the "exec" part. Your admin may be under the protected IP range

_________________
- Only registered users can see links on this board! Get registered or login! -

Need help? Only registered users can see links on this board! Get registered or login! 
View user's profile Send private message Visit poster's website
Guardian2003
Site Admin



Joined: Aug 28, 2003
Posts: 6799
Location: Ha Noi, Viet Nam

PostPosted: Thu Jan 17, 2008 9:45 am Reply with quote

Yup, there is a specific check for the string 'exec'
 
View user's profile Send private message Send e-mail
CodyG







PostPosted: Thu Jan 17, 2008 11:12 am Reply with quote

Thanks ... I suspected that Exec string ... it was changed and all is working as it should.

Is there a list of exclusions in one of the Sentinel files?
 
fkelly
Former Moderator in Good Standing



Joined: Aug 30, 2005
Posts: 3312
Location: near Albany NY

PostPosted: Thu Jan 17, 2008 11:26 am Reply with quote

And just to be a bit more specific the actual line of code that's probably getting you comes in the XSS attacks section:

[code] OR ( stristr($nsnst_const['query_string'], "exec") AND !stristr($nsnst_const['query_string'], "execu") ) [code]

So, you can see that there was some attempt to exempt the word "executive" while capturing the word "exec" by itself. Short term maybe you could change your magic selector word? Or you could comment that line out in NukeSentinel.php in your /includes directory. Or you could create an extra AND condition to allow for "contactExec". AND of course you could remember to put that back in next time there's a Sentinel update.
 
View user's profile Send private message Visit poster's website
fkelly







PostPosted: Thu Jan 17, 2008 12:57 pm Reply with quote

Just wondering as I walked back with the groceries, could we not just filter for the string " exec "? That's with a space before and after the four letters of exec. Is there a way an attacker could execute an attack without having a space before and after that word?
 
Guardian2003







PostPosted: Thu Jan 17, 2008 4:41 pm Reply with quote

I'm not following you. Why would you want to exclude it from the filter if it has a space before or aft? It wouldn't be a valid url or or function call with space would it?
 
fkelly







PostPosted: Thu Jan 17, 2008 5:52 pm Reply with quote

I think we are having a problem with the nomenclature. What the current code is saying (and correct me if I'm wrong) is if the string "exec" is in the query string and the query string does not contain the string "execu" (which I take it is part of execution, executive and other legitimate words that we don't want to block) then block the string.

This is part of a section of code that seeks to block XSS attacks. It also blocks cmd=

I am just saying that if we blocked any string that had " exec " in it (with the space before and after, we'd catch all the bad guys and we wouldn't run into situations like the one Codyg started this thread with. At least that's my proposal but I know there are others here who know much more about these kinds of attacks and I just wanted to float the idea out. If it floats here we can send it on to Bob Marion for his consideration.
 
Display posts from previous:       
This forum is locked: you cannot post, reply to, or edit topics.   This topic is locked: you cannot edit posts or make replies.    Ravens PHP Scripts And Web Hosting Forum Index -> RN NukeSentinel(tm) issues

View next topic
View previous topic
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum


Powered by phpBB © 2001-2007 phpBB Group
All times are GMT - 6 Hours
 
Forums ©