Internal IP Exposed
Jochen Bern
Jochen.Bern at binect.de
Mon Mar 25 12:25:21 UTC 2019
On 03/25/2019 01:08 PM, openssl-users-request at openssl.org digested:
> Date: Mon, 25 Mar 2019 11:33:55 +1100
> From: Abdul Qoyyuum <aqoyyuum at cardaccess.com.au>
>
> GET /images HTTP/1.0
Note that this is a HTTP 1.*0* request that doesn't require the client
to send a Host: header stating what *his* idea of "which server am I
trying to talk to?" is.
> HTTP/1.0 301 Moved Permanently
> Location: https://10.240.123.1:10443/images/
/images is a directory, which means that the client is supposed to ask
for "/images/" (with a trailing slash) to request a directory listing.
The server is helpfully sending back a HTTP Redirect to tell the client
what he *should* request instead, in the form of a complete URL, which
necessitates a host and port part. Having no idea who and what the
*client* expects to talk to, the server fills in what *it* knows - its
local (internal) IP and port. This "attack" already worked that way
almost 20 years ago, when I demonstrated it to some (horrified) bank IT
people on their Netscape-based online banking solution middleware ...
OpenSSL is not involved here, and whether (and what) you can do to close
the gap depends on what HTTP server (and, if present, reverse proxy
solution) you're using.
Regards,
--
Jochen Bern
Systemingenieur
www.binect.de
www.facebook.de/binect
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4278 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20190325/09753121/attachment.bin>
More information about the openssl-users
mailing list