You can review the entire conversation thread here: http://web.archiveorange.com/archive/v/zvbaIDN8J7uv2lETRSfD. As I said, this is NOT my work, I am only providing an explanation for enacting the changes, as well as a demo that it works.
First, log into your Apache server (if it hasn't been killed yet) and open up your "httpd.conf" file in vi or a another text editor. Append the following lines:
SetEnvIf Range (,.*?){5,} bad-range=1
RequestHeader unset Range env=bad-range
LimitRequestFieldSize 200
RequestHeader unset Range
*Note: please determine how these changes will affect your server and applications individually before applying them.
Save your httpd.conf file and restart the Apache service:
sudo service httpd restart
Here is a screenshot of my test system after applying the changes. As you can see, the attack immediately fails:
No comments:
Post a Comment