[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: ISA Server 2004 Log Manipulation



>There is a Log Manipulation vulnerability in Microsoft ISA Server
>2004, which when exploited will enable a malicious user to manipulate
>the Destination Host parameter of the log file.
...
>We were able to insert arbitrary characters, in this case the ASCII
>characters 1, 2, 3 (respectively) into the Destination Host parameter
>of the log file.

I'm curious about why you regard this as security-relevant.  I do not
know what you mean by "log manipulation".

Certainly the Host header is unusual in the sense that it is not an
expected format or syntax, although if I recall correctly, it's not
required in HTTP/1.0, which is the format of your request.  Does it
violate the syntactic requirements as dictated by the associated RFCs?
Is the Host field expected to be consistent with some set of valid
Host values, e.g. some set of supported virtual hosts?  Is it used as
part of the filename of the log file?  Do these specific characters
cause some parsing error that prevents other log entries from being
accessed or causes them to be desynchronized (e.g. if they are field
or record separator characters in the log file)?  Do these characters
a GUI obfuscation problem in which data is not properly rendered in a
window?  Do the characters have special meaning if the log file is
viewed by external tools such as "more" or Notepad, which would not be
under the control of ISA (and thus arguably not a vulnerability in ISA
itself)?  Was encoded CRLF injection tried but not successful?

Or is there some other reason?

- Steve