-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sven,

I have not attempted to reproduce this in the debian package, I'm
tracking known vulnerabilities with the testing-security team. When I
see a new CVE id assigned to a package and no bugs filed on that package
regarding that CVE, and no entries in the changelogs noting that it has
been fixed, I tend to believe that it hasn't been because it is a rare
package maintainer who has security issues fixed before they are
discovered or announced.

Additionally, the advisory indicates that the version in debian
(20040902-3) is affected, as the only versions it indicates are safe is
the TWikiRelease01Sep2004 patched with Florian Weimer's
UncoordinatedSecurityAlert23Feb2005 patches. Without any indication in
the BTS or in changelogs, I assume that the package is affected because
the version numbers typically are very good indicators. Admittedly, you
could very well have addressed this issue, and I have a feeling that you
have as Florian is very active in Debian. If so, I'd be happy to know
that, and we can close this bug, so I can note it in the
testing-security database.

Unfortunately, if I had to try every exploit, even those without
published exploits, for every CVE assigned, there would be a net loss. I
understand that this means this is an annoyance to you to get a grave
bug report for something that you may have addressed, however it ends up
being a good thing because then we know for sure, and can better track
vulnerabilities in Debian. It is better to be asked once if this is an
issue and have it properly noted, than for Debian to not pay attention
to anything at all and be riddled with security holes.

micah



Sven Dowideit wrote:
> excellent.
> 
> Micah, did you manage to reproduce this in the debian package at all?
> 
> you see, the debian package is significantly more secure than the
> upstream version, and as you've marked it as grave, I presume that you
> have found a way to make it happen. (as when I had a go, i did not get
> the exploit (i got a unhelpful, but correct error message "invalid
> number argument at /usr/share/perl5/TWiki.pm line 3339.")
> 
> could you please either tell me how to reproduce the problem in the
> current debian package, or close it?
> 
> Cheers
> 
> Sven
> 
> Micah Anderson wrote:
> 
>>>Package: twiki
>>>Version: 20040902-3
>>>Severity: grave
>>>Tags: security
>>>Justification: user security hole
>>>
>>>A new security bug in twiki showed up today:
>>>http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithInclude
>>>
>>>An attacker is able to execute arbitrary shell commands with the
>>>privileges of the web server process. The TWiki INCLUDE function
>>>enables a malicious user to compose a command line executed by the
>>>Perl backtick (`) operator.
>>>
>>>The rev parameter of the INCLUDE variable is not checked properly for
>>>shell metacharacters and is thus vulnerable to revision numbers
>>>containing pipes and shell commands. The exploit is possible on
>>>included topics with two or more revisions.
>>>
>>>Example INCLUDE variable exploiting the rev parameter:
>>>%INCLUDE{ "Main.TWikiUsers" rev="2|less /etc/passwd" }%
>>>
>>>The same vulnerability is exposed to all Plugins and add-ons that use
>>>TWiki::Func::readTopicText function to read a previous topic revision.
>>>This has been tested on TWiki:Plugins.RevCommentPlugin and
>>>TWiki:Plugins.CompareRevisionsAddon.
>>>
>>>If access to TWiki is not restricted by other means, attackers can use
>>>the revision function with or without prior authentication, depending
>>>on the configuration. 
>>>
>>>The Common Vulnerabilities and Exposures project has assigned the name
>>>CAN-2005-3056 to this vulnerability. Please include this number in any
>>>changelogs fixing this.
>>>
>>>
>>>-- System Information:
>>>Debian Release: testing/unstable
>>>  APT prefers testing
>>>  APT policy: (990, 'testing'), (500, 'unstable')
>>>Architecture: i386 (i686)
>>>Shell:  /bin/sh linked to /bin/bash
>>>Kernel: Linux 2.6.8-2-k7
>>>Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
>>>
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDQeLS9n4qXRzy1ioRAh14AJ94XXJC7UaX0vlpo+VIOqr+qRHM0QCfYf1Q
9ftwzksPFsreIMdvPx4Du2A=
=Khzi
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to