Full Disclosure mailing list archives
suexec doesn't ignore links in safe_path
From: rcs () rshell org (Guy Cohen)
Date: Wed, 2 Oct 2002 03:56:03 +0300
On Wed, Oct 02, 2002 at 02:26:30AM +0200, Niels Bakker wrote:
* rcs () rshell org (Guy Cohen) [Wed 02 Oct 2002, 02:14 CEST]:suexec suppose to guard you from unprivileged programs (among other things), by letting you configure a safe_path of execution. However, if a user is able to link, she can create a link to files outside of the safe_path and then execute them.And if a user is allowed to install a program that will be executed by the web server, that program can be written equally well to just execute something in a different location. In other words: your point?
Oh shit! my point was: if safe_path=/usr/local/bin and only program under that directory are allowed to be executed by the user, and if there's also 'ln' in that directory user can link to any other executable in the system, and run them. but i completely forgot about file/dir permission
-- Niels. -- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
-- Unix Administration, | http://www.uadm.com locally and remotely. | support () uadm com Planning, installation, | Phone: 972-3-6201373 support & upgrades. | Location: Unrestricted
Current thread:
- suexec doesn't ignore links in safe_path Guy Cohen (Oct 01)
- suexec doesn't ignore links in safe_path Niels Bakker (Oct 01)
- suexec doesn't ignore links in safe_path Guy Cohen (Oct 01)
- suexec doesn't ignore links in safe_path Charles Stevenson (Oct 01)
- suexec doesn't ignore links in safe_path White Vampire (Oct 01)
- suexec doesn't ignore links in safe_path Guy Cohen (Oct 01)
- suexec doesn't ignore links in safe_path Niels Bakker (Oct 01)