XSS dos attack server limit DOS

Source: Internet
Author: User

Mexican classmate weekend very depressed in the hotel Internet, found that YouTube was ban, so wrote a tool to solve the problem. Incidentally, a loophole that uses Google's statistics is written here.

Http://sirdarckcat.blogspot.com/2009/04/how-to-use-google-analytics-to-dos.html

This problem is actually caused by the request field limit of webserver.

Webserver generates a 400 or 4xx error when the HTTP request header is too long

Your Browser sent a request that this server could not understand.
Size of a Request header field exceeds server limit.

If these extra-long data is kept in a cookie, or if the HTTP header is long enough for the user to access each time, it will cause the user to have no access to the domain name, which is DOS.

Sirdarckcat found that there is a set-cookie in Google's statistics page, there is no control, similar to the search engine parameters will cause referer too long

Where these users can control will cause the HTTP request field to be very long, causing the server to return a server limit error.

Each webserver is a bit different, Apache may be 8192 bytes , specifically refer to here:

Http://apache.active-venture.com/mod/core6.htm

Eggplant tested in the afternoon, found in IE 8 can add 50 cookies, because each cookie limit is 4k (key, value pair), so the IE8 support cookie size is 204k. This is also the IE 8 new, not so big before. But these are far beyond the general webserver default server limit value

Btw:apache the Limite of HTTP request body is 2G by default.

It is worth noting that using XSS, you will be able to write cookies, resulting in this server limit Dos attack .

I have a POC:

<script language= "JavaScript" >alert (document.cookie); var metastr = "Aaaaaaaaaa"; Avar str = "" while (Str.length < 4000) {    str + metastr;} Alert (str.length);d Ocument.cookie = "evil3=" + "<script>alert (XSS) </script>" + "; Expires=thu, 18-apr-2019 08:37:43 GMT; ";    Some older versions of Webserver may also exist here Xssdocument.cookie = "evil1=" + str + "; Expires=thu, 18-apr-2019 08:37:43 GMT;"; Document.cookie = "evil2=" + str + "; Expires=thu, 18-apr-2019 08:37:43 GMT;"; Alert (Document.cookie);</script>

After this script is run, 3 cookies are planted under the current domain, with a total length of more than 8192 bytes, and then requesting the domain is inaccessible.

Because it is a stored cookie, it causes the user to be unable to access the site until the cookie is cleaned.

For the Internet site, users are the most important and most valuable resources, even if the user's account is stolen, the loss of the Internet company may not be the user can not access the site caused by large losses.

Using XSS WORM or the more powerful XSS, can easily cause thousands of, tens of thousands of of users cannot access the site!

Excerpt from: http://hi.baidu.com/aullik5/blog/item/6947261e7eaeaac0a7866913.html

XSS dos attack server limit DOS

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.