thanks for .zip google, going to have a lot of fun with this one
https://medium.com/@bobbyrsec/the-dangers-of-googles-zip-tld-5e1e675e59a5
thanks for .zip google, going to have a lot of fun with this one https://medium.com/@bobbyrsec/the-dangers-of-googles-zip-tld-5e1e675e59a5 50 comments
@ariadne As if most people could actually understand URLs, that ideology should have sailed ages ago and got hard-dropped when Android (and it's lack of showing the URL in the browser) came out.
0
0
16 May 2023 at 19:04 | Open on queer.hacktivis.me
Ha, easy! You simply have to compare the angle of the slashes to the ones after https: obviously in the first link the angle is too flat which indicates that it is a special character and no slash. So this is the link more likely containing the malware. As I said: Really obvious! ... we'll be fine. sry, I forgot the <sarcasm></sarcasm>-tags :) Even though I think that the Unicode-slash-attack vector existed already before, without the .zip TLD. @Ariadne Conill 🐰 since most people already get caught by something like https://my.website.tld, i do not think this will make a significant difference...
@ariadne and @deno_land uses "@" character in versioning of modules: What could *possibly* go wrong. @csdummi no clue, but I will say whatever the reason, it's certainly better than "we want to make money on .zip TLD" for .zip TLD to exist at all. @rysiek @ariadne @deno_land apparently U+2044 is supposed to be the horizontal line used for fractions (e.g. ⅜) and U+2215 for divisions (e.g. m/s). I'm not going far down this rabbit hole, but it really seems like we could do without those inside a URI. Ofc I have no idea, maybe a website for mathematics or physics relies on them. Though a browser add-on might be created to warn when they are in a URI. @csdummi @rysiek @ariadne @deno_land Firefox does it by default. also the username part is not rendered on the url preview on hover. @csdummi @selfisekai @rysiek @ariadne @deno_land don’t non-ASCII characters have to be urlencoded? If you’re showing the raw URL the encoding should make it apparent that they’re not path separators, and if you’re not showing the raw URL you should be using formatting to make the parts distinct. This strikes me as mostly a display bug Centrally blocking .zip in AdGuard I guess. https://social.treehouse.systems/@ariadne/110379902620355886 @ariadne yes, and I did not cheat. The slashes in the first arent legit. Hard to see. Nicely done. @ariadne it might be worth blacklisting the entire .zip TLD with something like pi-hole @ariadne but!
So anything that parses that as an URI is defective. … let’s see what my Fediverse instance/client/whatever does: https://github.com∕kubernetes∕kubernetes∕archive∕refs∕tags∕@v1271.zip ← should not be a link @ariadne Clearly, both result in evil, but the second one delivers evil in the form of Kubernetes. @ariadne the only answer I would accept: Both are equally as horror-inducing and you should be reported to HR for asking this in an interview. @ariadne This looks like a Chromium bug because unicode is not permitted in domain names. I believe any standards compliant browser will first resolve the string in “punycode” (real name) which breaks the chain of possible exploits before a page gets loaded (see RFC 3490). Perhaps some DNS pre-caching trick could work? I don’t think DNS has the same transcoding requirement (see the toASCII requirement) < release the standard nerds! 😈> @ariadne pardon my ignorance here, but both urls point to github.com using https. And that would pass on the rest of the URL to the web server at github who would then return results with a certain content type. So why would either represet a risk unless you are using some Microsoft web browser that does stuff it shouldn't? Normally, the @ in a URL would be right after the host name to include username/password combination, But after the first /, it would be passed as the "GET" to web server @jfmezei@mstdn.ca now compare the slashes in front of github.com to the ones after it. @ariadne I feel like this is less so a problem of the domain and moreso a problem of the notation and browser's ability to communicate to the user what it's actually doing.
I think an interesting solution could be to introduce a new scheme, say "web" that restricts what syntax is accepted to a subset used commonly by sites on the web. |