Tor security advisory: cross-protocol http form attack

2007-09-04T00:00:00
ID SECURITYVULNS:DOC:17937
Type securityvulns
Reporter Securityvulns
Modified 2007-09-04T00:00:00

Description

http://archives.seul.org/or/announce/Sep-2007/msg00000.html

"... a malicious website or Tor exit node can give the Tor user a page that includes a POST element directed to Tor's control port (localhost:9051)...

This particular attack worked because Tor's control protocol gave an error message on unrecognized commands but didn't hang up. So all the http headers from the POST were unrecognized commands, and eventually we got to the payload -- which contains recognized commands -- and it went bad from there...

Yay full disclosure "

even links on openbsd affected, whee!

(upgrade to 0.2.0.6-alpha to help balance the network :)