Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 23 Feb 2012 18:05:06 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security@...ts.openwall.com, Clay Gerrard <clay.gerrard@...il.com>,
        Ian Bicking <ianbicking@...il.com>, Jan Pokorny <jpokorny@...hat.com>,
        David Malcolm <dmalcolm@...hat.com>, Luke Macken <lmacken@...hat.com>
Subject: CVE Request -- python-paste-script: Supplementary groups not dropped
 when started an application with "paster serve" as root

Hello Kurt, Steve, vendors,

   a security flaw was found in the way Paster, a pluggable command-line frontend,
when started as root (for example to have access to privileged port) to serve a
web based application, performed privileges dropping upon startup
(supplementary groups were not dropped properly regardless of the UID, GID
specified in the .ini configuration file or in the --user and --group CL
arguments). A remote attacker could use this flaw for example to read / write
root GID accessible files, if the particular web application provided remote
means for local file manipulation.

Credit / Issue Reported by: Clay Gerrard

References:
[1] http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471
[2] https://bugzilla.redhat.com/show_bug.cgi?id=796790

Patch proposed by the issue reporter:
[3] https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve

Upstream patch:
[4] https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4

Could you allocate a CVE id for this?

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.