COMMAND
Roxen
SYSTEMS AFFECTED
All systems running Roxen with the Pike-tag enabled.
PROBLEM
Peter Bortas found following. Following some discussion on the
Roxen mailing list a rather nasty exploit that works on many
Roxen servers was discovered. This also applies to a less degree
of all systems running Roxen with the main RXML-parser enabled.
Due to the recursive nature of RXML it is vital that input from
the client is properly quoted or stopped from further recursive
parsing. The code for the <referer>-tag missed to do this
properly. OBSERVE: You are not protected just because you are not
using the <referer>-tag!
SOLUTION
Apply this patch to htmlparse.pike:
--- htmlparse.pike 1999/05/25 11:40:57 1.180
+++ htmlparse.pike 1999/10/05 08:30:18
@@ -2521,7 +2521,7 @@
if(m->help)
return ("Compatibility alias for referrer");
if(id->referer)
- return sizeof(id->referer)?id->referer*"":m->alt?m->alt:"..";
+ return sizeof(id->referer)?({ id->referer*"" }):m->alt?m->alt:"..";
return m->alt?m->alt:"..";
}
cd to the Roxen directory and run:
patch server/modules/tags/htmlparse.pike < file_with_patch
Or, disable the RXML-parser in all you Roxen servers. This will
also automaticly disable the Pike-tag. The patch is also
available as
ftp://ftp.roxen.com/pub/roxen/patches/roxen_1.3.111-htmlparse.pike.patch