[dns-operations] Web Proxy Auto-Discovery (WPAD) Information Disclosure

Gadi Evron ge at linuxbox.org
Tue Dec 4 06:56:51 UTC 2007


On Tue, 4 Dec 2007, Rickard Dahlstrand wrote:
> Gadi Evron wrote:
>> http://www.microsoft.com/technet/security/advisory/945713.mspx
>>
>> A malicious user could host a WPAD server, potentially establishing it as
>> a proxy server to conduct man-in-the-middle attacks against customers
>> whose domains are registered as a subdomain to a second-level domain
>> (SLD). For customers with a primary DNS suffix configured, the DNS
>> resolver in Windows will attempt to resolve an unqualified .wpad. hostname
>> using each sub-domain in the DNS suffix until a second-level domain is
>> reached. For example, if the DNS suffix is corp.contoso.co.us and an
>> attempt is made to resolve an unqualified hostname of wpad, the DNS
>> resolver will try wpad.corp.contoso.co.us. If that is not found, it will
>> try, via DNS devolution, to resolve wpad.contoso.co.us. If that is not
>> found, it will try to resolve wpad.co.us, which is outside of the
>> contoso.co.us domain.
>>
> Most of the wpad.tld domains are already reserved like this one
> http://wpad.com/ It's amazing that when they fixed it for .com etc. a
> while back they missed that there where two-level tld-domains.
>
> Rickard.
>

http://www.microsoft.com/technet/security/bulletin/fq99-054.mspx
-----
What's the problem with the search algorithm?
When IE 5 starts, it will begin searching for a WPAD server, if it is 
configured to use WPAD. It starts the search by adding the hostname "WPAD" 
to current fully-qualified domain name. For instance, a client in 
a.b.Microsoft.com would search for a WPAD server at 
wpad.a.b.microsoft.com. If it could not locate one, it would remove the 
bottom-most domain and try again; for instance, it would try 
wpad.b.microsoft.com next. IE 5 would stop searching when it found a WPAD 
server or reached the third-level domain, wpad.microsoft.com.
The algorithm stops at the third level in order to not search outside of 
the current network. However, for international sites, this is not 
sufficient, because third-level domains can be outside the current 
network. For example, if the network at xyz.com.au did not have a WPAD 
server, the search algorithm eventually would reach wpad.com.au, which is 
an external network name. If the owner of wpad.com.au set up a WPAD 
server, he or she could provide chosen proxy server configuration settings 
to the clients at xyz.com.au. For that matter, any network in com.au that 
didn't have its own WPAD server but did have WPAD enabled in its web 
clients also would also resolve to wpad.com.au.
-----
>From the FAQ for the 1999 fix...

It is quite possible, and we can assume (until someone tells us they 
know), that they fixed it for ccTLDs as well, and then re-introduced the 
flaw somehow.

Also:
http://www.wlug.org.nz/WPAD
-----
(BeauButler?: I have registered wpad.co.nz, and do not intend to be 
'really nasty'. I am collecting the 404 logs with the intention to produce 
some nice charts, hoever. Also, the wpad organisational-boundaries bug 
appears to have resurfaced in Internet Explorer 7!!)
-----
Beau Bulter is the guy who got all the press by talking about this at 
kiwicon last week:
https://kiwicon.org/presentations#oddy

This is the story that got Microsoft's attention:
http://www.theage.com.au/news/technology/flaw-leaves-microsoft-looking-like-a-turkey/2007/11/23/1195975914416.html
Which is where Beau says there are ~160,000 exploitable machines in NZ 
alone. He would *supposedly* know since he has the wpad.co.nz domain.

Whether it is a major issue or not, misconfigurations happens, heck, shit 
happens. I'd think we should watch for this and get that domain 
registered/monitored at different ccTLDs.

 	Gadi.



More information about the dns-operations mailing list