|
|
Message-ID: <4F4671C2.8090407@redhat.com>
Date: Thu, 23 Feb 2012 18:05:06 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security@...ts.openwall.com, Clay Gerrard <clay.gerrard@...il.com>,
Ian Bicking <ianbicking@...il.com>, Jan Pokorny <jpokorny@...hat.com>,
David Malcolm <dmalcolm@...hat.com>, Luke Macken <lmacken@...hat.com>
Subject: CVE Request -- python-paste-script: Supplementary groups not dropped
when started an application with "paster serve" as root
Hello Kurt, Steve, vendors,
a security flaw was found in the way Paster, a pluggable command-line frontend,
when started as root (for example to have access to privileged port) to serve a
web based application, performed privileges dropping upon startup
(supplementary groups were not dropped properly regardless of the UID, GID
specified in the .ini configuration file or in the --user and --group CL
arguments). A remote attacker could use this flaw for example to read / write
root GID accessible files, if the particular web application provided remote
means for local file manipulation.
Credit / Issue Reported by: Clay Gerrard
References:
[1] http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471
[2] https://bugzilla.redhat.com/show_bug.cgi?id=796790
Patch proposed by the issue reporter:
[3] https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve
Upstream patch:
[4] https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4
Could you allocate a CVE id for this?
Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.