"Adware" in libwww-perl (not a bug - just a common misunderstanding)

Bug #199371 reported by Michael Jumper
254
Affects Status Importance Assigned to Milestone
libwww-perl (Ubuntu)
Invalid
Undecided
Unassigned

Bug Description

This is not a bug, nor is it actually adware or malware of any kind. The report simply results from a misunderstanding of the semantics of the GET command. The syntax is not that of standard HTTP, and running

GET / HTTP/1.1

Actually tries to download two pages: / and HTTP/1.1 - the latter being one of those ad/search related sites.

Original description follows.

-----

Using Ubuntu Gutsy, package is libwww-perl (version 5.805-1, which should be the latest)

Typing GET / HTTP/1.1 on the command line invokes lwp-request, a perl script. But the HTML code that it dumped contains the expected list of all directories in the local root, followed by unexpected _adware_ (result of GET / HTTP/1.1 is attached).

Notice that at the end of the valid and requested HTML code, code has been appended by the script which:
1) Includes, though the use of frames, an external advertising site.
2) Uses the Windows/DOS newline style for the appended code, which obviously was not generated in the same manner of the valid code (which appropriately outputs standard UNIX newlines)

Revision history for this message
Michael Jumper (zhangmaike) wrote :
Revision history for this message
Michael Jumper (zhangmaike) wrote :

The ad-loading code is downloaded from an external site located at 205.234.170.164. I've attached strace output from the GET / HTTP/1.1 command - the relevant output is towards the end.

By the way, this is EVERYWHERE - not just Ubuntu - I've also found this problem on the Fedora servers at school, and I wouldn't be suprised if it affects every perl installation.

description: updated
Revision history for this message
Michael Jumper (zhangmaike) wrote :

Looking at the strace output further, that IP address (205.234.170.164) is received by the adware in libwww-perl through a lookup of the domain name:

www.HTTP.com

which is also the domain name mentioned in the adware itself.

Revision history for this message
Michael Jumper (zhangmaike) wrote :

Searching google shows that this has happened before by many others who accidentally type GET / HTTP/1.1 on the command line.

To someone who expects only / to be returned, this seems like adware, but it actually is not; GET - being a command, not the HTTP request - tries to get two things: / and 1.1 from HTTP - which happens to resolve to www.HTTP.com.

So there actually is no problem.

GET / returns the expected result.
GET HTTP/1.1 returns the "adware"

description: updated
Jorge Castro (jorge)
Changed in libwww-perl:
status: New → Invalid
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.