Log inRegister an accountBrowse CSDbHelp & documentationFacts & StatisticsThe forumsAvailable RSS-feeds on CSDbSupport CSDb Commodore 64 Scene Database
 Welcome to our latest new user maak ! (Registered 2024-04-18) You are not logged in - nap
CSDb User Forums


Forums > CSDb Bug Reports > Pewp is testing the database
2016-10-02 10:06
hedning

Registered: Mar 2009
Posts: 4575
Pewp is testing the database

If you see anything strange on CSDb these days, like XSS stuff and so on, weird code blobs etc, don't worry. pewp/G*P and Perff are testing the database and potential vulnerabilities. It is completely under control.
 
... 1 post hidden. Click here to view all posts....
 
2016-10-02 10:43
Burglar

Registered: Dec 2004
Posts: 1031
thats good stuff, but did he really have to steal session cookies the other day?
2016-10-02 10:46
chatGPZ

Registered: Dec 2001
Posts: 11090
*pinches gf's nipples* "i'm just testing something!"
2016-10-02 15:52
pewp

Registered: Feb 2015
Posts: 3
Yes, i had to steal the session cookies (target was NOT everyone, but Perff. I only modified MY own profile and told Perff to visit my page while i had the JavaScript there. It was deleted as soon as we finished testing our stuff.

I wanted to see if the session cookie was assigned to a special IP number (which can be used to prevent session stealing), but a moderator cleared and took ownership of my profile before we could test this.

And trust me, im doing this to make CSDB better, not to cause any problems. You really want me to find these things before someone else does and actually starts causing problems.

I also invite anyone to join me in making CSDB better, if you want to participate in this security audit, let me know, or contact Perff.

Questions?
2016-10-02 16:03
Burglar

Registered: Dec 2004
Posts: 1031
well, the account you created (with the XSS in the username) showed up on the homepage within minutes, and therefore it started cookie hijacking everybody visiting the homepage, not just Perff ;)
we found out pretty quickly and a mod took care of getting rid of the account, but I'm sure your server must've received multiple cookies from various users. If you didn't, the xss was buggy ;)
2016-10-02 16:51
Burglar

Registered: Dec 2004
Posts: 1031
tip 1:

Add the HttpOnly flag to the cookies here, so even when there is an XSS flaw, your cookie cant be stolen that easily.
https://www.owasp.org/index.php/HTTPOnly

tip 2:

csdb is vulnerable to http-slow attacks, when executed it takes the site offline. can be fixed by putting a reverse proxy (eg varnish, and I guess nginx can handle it too) infront of csdb's apache/modphp.
2016-10-03 12:08
Total Chaos

Registered: Mar 2006
Posts: 74
Pewp vs. Burglar - I want a demo about it!
;)
2016-10-03 12:28
Mr.Ammo
Account closed

Registered: Oct 2002
Posts: 228
If this testing is all about security, then please fix csdb.dk's certificate too. The one csdb is using now is not trusted by any web browser. You surely must have found this week spot during your security testing.

Perhaps https://letsencrypt.org/ might be a nice source to get a decent certificate.
2016-10-07 11:07
pewp

Registered: Feb 2015
Posts: 3
Quote: well, the account you created (with the XSS in the username) showed up on the homepage within minutes, and therefore it started cookie hijacking everybody visiting the homepage, not just Perff ;)
we found out pretty quickly and a mod took care of getting rid of the account, but I'm sure your server must've received multiple cookies from various users. If you didn't, the xss was buggy ;)


Yes, i received a few cookies, but trust me, they are deleted and not saved. As i said, my intention was to make the site better. I have no interest in hijacking people.

We are doing this to improve security.
2016-10-07 11:09
pewp

Registered: Feb 2015
Posts: 3
Quote: tip 1:

Add the HttpOnly flag to the cookies here, so even when there is an XSS flaw, your cookie cant be stolen that easily.
https://www.owasp.org/index.php/HTTPOnly

tip 2:

csdb is vulnerable to http-slow attacks, when executed it takes the site offline. can be fixed by putting a reverse proxy (eg varnish, and I guess nginx can handle it too) infront of csdb's apache/modphp.


Great tips and findings. We never went so far to look at those things, we started to look at the webapp itself.

I have requested the source code from Perff, still waiting for that. This makes things easier and then we wont accidentally target other users.
2016-10-07 14:05
bugjam

Registered: Apr 2003
Posts: 2476
While you are at it, maybe you have an idea about the issue described here: http://csdb.dk/forums/?roomid=12&topicid=111723#111785 . The problem still persists, in a randowm manner: sometimes I can download a couple of different .d64 files without problem, then all of a sudden it "hangs" again with the last download - and all following d64 files that I download turn out to be that same last file. And then (again at random) it works again for a bit.
My IP was also clueless; the thing that I found out is that it depends on my IP address: when I go through a proxy, it works! Just a bit cumbersome that way...
Previous - 1 | 2 - Next
RefreshSubscribe to this thread:

You need to be logged in to post in the forum.

Search the forum:
Search   for   in  
All times are CET.
Search CSDb
Advanced
Users Online
Sokratekk
maak
Martin Piper
MCM/ONSLAUGHT
Fred/Channel 4
A3/AFL
Guests online: 125
Top Demos
1 Next Level  (9.8)
2 Mojo  (9.7)
3 Coma Light 13  (9.7)
4 Edge of Disgrace  (9.6)
5 Comaland 100%  (9.6)
6 No Bounds  (9.6)
7 Uncensored  (9.6)
8 Wonderland XIV  (9.6)
9 The Ghost  (9.6)
10 Bromance  (9.6)
Top onefile Demos
1 It's More Fun to Com..  (9.9)
2 Party Elk 2  (9.7)
3 Cubic Dream  (9.6)
4 Copper Booze  (9.5)
5 Rainbow Connection  (9.5)
6 TRSAC, Gabber & Pebe..  (9.5)
7 Onscreen 5k  (9.5)
8 Dawnfall V1.1  (9.5)
9 Quadrants  (9.5)
10 Daah, Those Acid Pil..  (9.5)
Top Groups
1 Oxyron  (9.3)
2 Nostalgia  (9.3)
3 Booze Design  (9.3)
4 Censor Design  (9.3)
5 Crest  (9.3)
Top Crackers
1 Mr. Z  (9.9)
2 S!R  (9.9)
3 Mr Zero Page  (9.8)
4 Antitrack  (9.8)
5 OTD  (9.8)

Home - Disclaimer
Copyright © No Name 2001-2024
Page generated in: 0.045 sec.