This project is archived and is in readonly mode.

#691 ✓invalid
Christian Nolte

Rails 2.1.0: mod_security reports a Response Splitting Attack

Reported by Christian Nolte | July 24th, 2008 @ 03:45 PM | in 2.x

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

I use the apache proxy to forward traffic to mongrel. The apache has

mod_security enabled and since I made an update to Rails 2.1.0

mod_security blocks access with the following message:

[24/Jul/2008:16:13:36 +0200]

[myhost/sid#988eef8][rid#a29a550][/myapp/][1] Access denied with code

400 (phase 2). Pattern match "%0[ad]" at REQUEST_HEADERS:Cookie. [id

"950910"] [msg "HTTP Response Spli

tting Attack. Matched signature <%0a>"] [severity "ALERT"]

I don't know what exactly is causing this. I am using

restful_authentication.

  • --

For more than 4 generations the IT Professionals were the guardians

of quality and stability in software. Before the dark times.

Before Microsoft...

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.7 (GNU/Linux)

Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFIiJVOCNjA0nfhW7wRAi9pAKDCfFflgAQHMHw2iY1+ny69x80zsACg/1Zj

N/boFouoMwWM/rBvztgjCSM=

=sWDa

-----END PGP SIGNATURE-----

Comments and changes to this ticket

Create your profile

Help contribute to this project by taking a few moments to create your personal profile. Create your profile »

<h2 style="font-size: 14px">Tickets have moved to Github</h2>

The new ticket tracker is available at <a href="https://github.com/rails/rails/issues">https://github.com/rails/rails/issues</a>

People watching this ticket

Pages