|
Message-ID: <54C014E8.9050703@pipping.org> Date: Wed, 21 Jan 2015 22:06:48 +0100 From: Sebastian Pipping <sebastian@...ping.org> To: oss-security@...ts.openwall.com Subject: CVE or not: 2x grml-debootstrap Hi! TLDR: * One or two CVE candidates * Review of proposed fixes wanted * Ideas on realistic attack scenarios welcome grml-debootstrap [1] is a wrapper around debootstrap written in Bash. I recently ran into two bugs in grml-debootstrap, documented in detail at the following GitHub issues. 1) For the first Issues with sourcing cmdlineopts.clp from current working directory https://github.com/grml/grml-debootstrap/issues/59 I am rather clear about exploitability. Please review the proposed approach for a fix. 2) For the second Lack of user input escaping / use of $!`"\ in passwords https://github.com/grml/grml-debootstrap/issues/58 I still wonder about realistic exploitation scenarios. Since the tool is usually executed by root or using sudo, input from a non-root user would need to make its way into the command line, unfiltered or filtered insufficiently. It could either be a service like live-build http://cgi.build.live-systems.org/cgi-bin/live-build (they don't call grml-debootstrap, if the code is [2]) or a sudoers config like user23 ALL=(ALL) NOPASSWD: /usr/sbin/grml-debootstrap \ --password * ..... though I am note sure how much of a likely setup that is. Other ideas on scenarios? Also, please review my proposal on escaping. Thanks and best, Sebastian [1] https://github.com/grml/grml-debootstrap [2] https://packages.debian.org/de/wheezy/live-build
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.