Re: Bug found in ht://Dig htsearch CGI

From: Geoff Hutchison (ghutchisat_private)
Date: Sun Oct 07 2001 - 13:46:40 PDT

  • Next message: Devrim SERAL: "pam_limits.so Bug!!"

    * Name: ht://Dig (htsearch CGI)
    
    * Versions affected: 3.1.0b2 and more recent, including 3.1.5 and 3.2.0b3
    
    * Vulnerability:   (Potential remote exposure. Denial of Service.)
    
    * Details:
    The htsearch CGI runs as both the CGI and as a command-line program. 
    The command-line program accepts the -c [filename] to read in an 
    alternate configuration file. On the other hand, no filtering is done 
    to stop the CGI program from taking command-line arguments, so a 
    remote user can force the CGI to stall until it times out (resulting 
    in a DOS) or read in a different configuration file.
    
    For a remote exposure, a specified configuration file would need to 
    be readable via the webserver UID, e.g. via anonymous FTP with upload 
    enabled or samba world-readable log files are the possible targets) 
    to potentially retrieve files readable by the webserver UID.
    e.g.
    nothing_found_file: /path/to/the/file/we/steal
    
    * Potential exploit:
    http://your.host/cgi-bin/htsearch?-c/dev/zero
    http://your.host/cgi-bin/htsearch?-c/path/to/my.file
    
    * Fix:
    Upgrade to current prerelease versions of 3.1.6 or 3.2.0b4, or apply 
    attached patches.
    
    Prerelease versions are available from <http://www.htdig.org/files/snapshots/>
    
    
    






    This archive was generated by hypermail 2b30 : Mon Oct 08 2001 - 22:15:35 PDT