[问题]资安弱扫遇到的问题Same site scripting

楼主: luckdavid (茶米)   2015-12-09 13:11:37
各位先进大家好,我遇到一个问题解不掉想请大家帮帮忙。
以下是弱扫报告:
Severity:Medium
Type:Configuration
Reported by module :Scripting (Subdomain_Takeover.script)
Description:Tavis Ormandy reported a common DNS misconfiguration that can
result in a minor security issue with web applications. "It's a common
and sensible practice to install records of the form "localhost.
IN A 127.0.0.1" into nameserver configurations, bizarrely however,
administrators often mistakenly drop the trailing dot, introducing an
interesting variation of Cross-Site Scripting (XSS) I call Same-Site
Scripting. The missing dot indicates that the record is not fully qualified,
and thus queries of the form "localhost.example.com" are resolved.
While superficially this may appear to be harmless, it does in fact allow
an attacker to cheat the RFC2109 (HTTP State Management Mechanism) same
origin restrictions, and therefore hijack state management data."
Impact:An attacker can cheat the RFC2109 (HTTP State Management Mechanism)
same origin restrictions, and therefore hijack state management data.
Recommendation:It is advised that non-FQ localhost entries be removed from
nameserver configurations for domains that host websites that rely on HTTP
state management.
拜托了。。。
作者: LPH66 (-6.2598534e+18f)   2015-12-09 15:42:00
DNS 设定, 有一个 A 记录 localhost 应在其后加一个点不加的话攻击者可以用 localhost.example.com 来绕过example.com 上面的 XSS 限制或者就干脆把这条 A 记录给拿掉, 这样 localhost 这个名字不经过 DNS 就不会有这个问题
作者: threeus (侍衛)   2015-12-10 18:48:00
高手在人间

Links booklink

Contact Us: admin [ a t ] ucptt.com