Re: [WEB SECURITY] [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos
Hi,
Too bad you have fell for this without verifying things first i'll just break
two of the claims given by secniche.
First of all lets all get this straight, JWIG is for web services creation. For
the attacks to succeed the attacker will have to manipulate the things at the
server end.
Reading http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf
1. Claim: Code gapping.
The example given will have to be written at the server end, very similar to
writing
a PHP program. So tell me if you write rogue code yourself and load it is it
JWIG to
blame ?. The attacker cannot load this rogue code. For example the code at the
following link
http://www.brics.dk/JWIG/demo/TempMan.jwig
Once this is compliled and installed, can't see how an attacker will manipulate
this.
2. Claim: XML Fragmenting
This is where it gets really strange, the example given again has to written as
a source
code, compiled and then installed. If i write a code that refers to a XML
document
it is me responsible for ensuring that the things are right not JWIG, also this
is simply called External XML templates and it has nothing to do with
fragmenting.
http://www.brics.dk/JWIG/manual/documents.html
So finally to put things together, Can't see where is the vulnerability.
If you write rogue code yourself you cannot blame JWIG, PHP etc.
The rest of the article is also filled with same bogus claims.
I would request everyone to take a very close look at secniche claims.
Also please continue using JWIG it is a sweet technology, especially features
like an explicit language-based notion of sessions, which avoids cookies and URL
rewriting, makes it a more better platform for writing secure web applications.
regards
warl0ck // MSG