|
Message-ID: <157c85dc-9fc6-bd11-cc0b-c22a46c2d091@apache.org> Date: Mon, 08 May 2023 03:57:31 +0000 From: Wang Weibing <wwbmmm@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2023-31039: Apache bRPC: ServerOptions.pid_file may cause arbitrary code execution Severity: important Affected versions: - Apache bRPC 0.9.0 before 1.5.0 Description: Security vulnerability in Apache bRPC <1.5.0 on all platforms allows attackers to execute arbitrary code via ServerOptions::pid_file. An attacker that can influence the ServerOptions pid_file parameter with which the bRPC server is started can execute arbitrary code with the permissions of the bRPC process. Solution: 1. upgrade to bRPC >= 1.5.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.5.0/ https://dist.apache.org/repos/dist/release/brpc/1.5.0/ 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch: https://github.com/apache/brpc/pull/2218 https://github.com/apache/brpc/pull/2218 Required Configurations: set brpc::ServerOptions::pid_file from user input Work Arounds: Apply this patch: https://github.com/apache/brpc/pull/2218 https://github.com/apache/brpc/pull/2218 References: https://brpc.apache.org https://www.cve.org/CVERecord?id=CVE-2023-31039
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.