[Owasp-testing] HTTP TRACK and WEBDAV

Dave van Stein dvstein at gmail.com
Mon Jun 9 08:33:17 EDT 2008


Talking about new thing/ways to test .. Did anybody see this blog:
http://0x000000.com/index.php?i=590&bin=1001001110
It's about using existing, available .js or other resource for generating
XSS and thus bypassing 'script filtering' and other blacklisting methods ...

Very interesting and also something to at least mention in the manual ?

Dave




2008/6/9 <gsiere at comcast.net>:

>  All,
>
> Ref HTTP Method Section 4.3.8
>
> Has anyone seen HTTP "TRACK" method enabled when "TRACE" was not?  Would it
> make sense to test for "TRACK" separately?  From what I've seen, TRACK
> behaves pretty much like TRACE - so you should be able to get an XST attack
> from it -  but I've only seen both or none.  I guess it might be a way to
> circumvent an ACL or filter if TRACE is prohibited?
>
> Also, how about all the WEBDAV methods like LOCK, COPY, MOVE, etc?
> http://www.webdav.org/specs/rfc2518.html#rfc.section.4.4
>
> Is there a single method you can check to see if WEBDAV is enabled at all
> (like maybe PROPFIND)? (assuming something like OPTIONS doesn't already tell
> you)?  I havn't seen this too often, and was going to research this a little
> but thought someone might already have some insight.
>
> -George
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-testing/attachments/20080609/aced342f/attachment.html 


More information about the Owasp-testing mailing list