oss-sec mailing list archives

Re: CVE Request -- libfcgi-perl / perl-FCGI: Certain environment variables shared between first and subsequent HTTP requests


From: Moritz Muehlenhoff <jmm () debian org>
Date: Thu, 8 Sep 2011 14:25:34 +0200

On Thu, Sep 08, 2011 at 10:32:47AM +0200, Jan Lieskovsky wrote:
Hello Josh, Steve, vendors,

  it was found that the perl Fast CGI module did not properly clean up
certain environment variables, related to a particular HTTP request,
between subsequent incoming requests. Any environment variable set in
the first pass through the code by processing the first request, that
wasn't set in some subsequent request, has been added to the hash
containing environment variables for that subsequent request. A remote
attacker could use this flaw to bypass the authentication process and
obtain access to resources, which would be otherwise protected by
authentication.

References:
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607479
[2] https://bugzilla.redhat.com/show_bug.cgi?id=736604

Russ Allbery of Debian (Cc-ed) provides further elaborated analysis
of the reasons of the issue:
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607479#10

Cc-ed also Sven Verdoolaege, the perl FCGI module author (as noted
on CPAN) for his opinion too.

Could you allocate a CVE id for this issue?

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

P.S.: Though the issue has been reported Sat, 18 Dec 2010 22:13:40 +0100
      already, only Russ's analysis (Wed, 07 Sep 2011 20:24:00 -0700)
      unveiled the full security implications of this issue. So I
      assume, the CVE-2011-* identifier would be sufficient to cover
      this issue. But feel free to correct me if I am wrong here.
      Thanks, Jan.

FYI: Debian already allocated CVE-2011-2766 to this.
http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=19;bug=607479

Cheers,
        Moritz


Current thread: