<<< Date Index >>>     <<< Thread Index >>>

Re: [WEB SECURITY] [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos



Hi,

Too bad you have fell for this without verifying things first i'll just break
two of the claims given by secniche.

First of all lets all get this straight, JWIG is for web services creation. For
the attacks to succeed the attacker will have to manipulate the things at the
server end.

Reading http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf

1. Claim: Code gapping.

The example given will have to be written at the server end, very similar to 
writing
a PHP program. So tell me if you write rogue code yourself and load it is it 
JWIG to
blame ?. The attacker cannot load this rogue code. For example the code at the
following link

http://www.brics.dk/JWIG/demo/TempMan.jwig

Once this is compliled and installed, can't see how an attacker will manipulate 
this.


2. Claim: XML Fragmenting

This is where it gets really strange, the example given again has to written as 
a source
code, compiled and then installed. If i write a code that refers to a XML 
document
it is me responsible for ensuring that the things are right not JWIG, also this
is simply called External XML templates and it has nothing to do with 
fragmenting.

http://www.brics.dk/JWIG/manual/documents.html

So finally to put things together, Can't see where is the vulnerability.
If you write rogue code yourself you cannot blame JWIG, PHP etc.

The rest of the article is also filled with same bogus claims.

I would request everyone to take a very close look at secniche claims.

Also please continue using JWIG it is a sweet technology, especially features
like an explicit language-based notion of sessions, which avoids cookies and URL
rewriting, makes it a more better platform for writing secure web applications.

regards

warl0ck // MSG