Full Disclosure mailing list archives

suexec doesn't ignore links in safe_path


From: rcs () rshell org (Guy Cohen)
Date: Wed, 2 Oct 2002 03:56:03 +0300

On Wed, Oct 02, 2002 at 02:26:30AM +0200, Niels Bakker wrote:
* rcs () rshell org (Guy Cohen) [Wed 02 Oct 2002, 02:14 CEST]:
suexec suppose to guard you from unprivileged programs (among other things),
by letting you configure a safe_path of execution. However, if a user is 
able to link, she can create a link to files outside of the safe_path and 
then execute them.

And if a user is allowed to install a program that will be executed by
the web server, that program can be written equally well to just execute
something in a different location.

In other words: your point?

Oh shit!

my point was:
if safe_path=/usr/local/bin and only program under that directory
are allowed to be executed by the user, and if there's also 'ln' in 
that directory user can link to any other executable in the system, and
run them.


but i completely forgot about file/dir permission



      -- Niels.

-- 
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

-- 
Unix Administration,       |      http://www.uadm.com
locally and remotely.      |      support () uadm com
Planning, installation,    |      Phone: 972-3-6201373
support & upgrades.        |      Location: Unrestricted


Current thread: