-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Does this mean that the twiki (20040902-3) in Debian is not vulnerable
and this bug report can be closed?

Micah

Sven Dowideit wrote:
> while I think its very reasonable for you to send along these
> advisories, and even doing so as a BTS bug wothout testing them
> 
> I think its incredibly rude to do so without saying that you have not
> tested it out.
> 
> please, if you enter a bug report, tell the maintainer what you have or
> have not done, that way they can deal more appropriatly with the issue
> 
> (in the cases where the core issue has been dealt with (thanks to
> Florian!) I'm very busy helping out upstream, and i'm sure this
> situation _should_ apply to others (i object to the number of debian
> maintainers that are not appropriatly active upstream)
> 
> however, other than my rant :) thanks for the notification, its
> important (i'm still notifying people now)
> 
> Sven
> 
> micah wrote:
> 
>>>Sven,
>>>
>>>I have not attempted to reproduce this in the debian package, I'm
>>>tracking known vulnerabilities with the testing-security team. When I
>>>see a new CVE id assigned to a package and no bugs filed on that package
>>>regarding that CVE, and no entries in the changelogs noting that it has
>>>been fixed, I tend to believe that it hasn't been because it is a rare
>>>package maintainer who has security issues fixed before they are
>>>discovered or announced.
>>>
>>>Additionally, the advisory indicates that the version in debian
>>>(20040902-3) is affected, as the only versions it indicates are safe is
>>>the TWikiRelease01Sep2004 patched with Florian Weimer's
>>>UncoordinatedSecurityAlert23Feb2005 patches. Without any indication in
>>>the BTS or in changelogs, I assume that the package is affected because
>>>the version numbers typically are very good indicators. Admittedly, you
>>>could very well have addressed this issue, and I have a feeling that you
>>>have as Florian is very active in Debian. If so, I'd be happy to know
>>>that, and we can close this bug, so I can note it in the
>>>testing-security database.
>>>
>>>Unfortunately, if I had to try every exploit, even those without
>>>published exploits, for every CVE assigned, there would be a net loss. I
>>>understand that this means this is an annoyance to you to get a grave
>>>bug report for something that you may have addressed, however it ends up
>>>being a good thing because then we know for sure, and can better track
>>>vulnerabilities in Debian. It is better to be asked once if this is an
>>>issue and have it properly noted, than for Debian to not pay attention
>>>to anything at all and be riddled with security holes.
>>>
>>>micah
>>>
>>>
>>>
>>>Sven Dowideit wrote:
>>>
>>>
>>>>>excellent.
>>>>>
>>>>>Micah, did you manage to reproduce this in the debian package at all?
>>>>>
>>>>>you see, the debian package is significantly more secure than the
>>>>>upstream version, and as you've marked it as grave, I presume that you
>>>>>have found a way to make it happen. (as when I had a go, i did not get
>>>>>the exploit (i got a unhelpful, but correct error message "invalid
>>>>>number argument at /usr/share/perl5/TWiki.pm line 3339.")
>>>>>
>>>>>could you please either tell me how to reproduce the problem in the
>>>>>current debian package, or close it?
>>>>>
>>>>>Cheers
>>>>>
>>>>>Sven
>>>>>
>>>>>Micah Anderson wrote:
>>>>>
>>>>>
>>>>>
>>>>>>>Package: twiki
>>>>>>>Version: 20040902-3
>>>>>>>Severity: grave
>>>>>>>Tags: security
>>>>>>>Justification: user security hole
>>>>>>>
>>>>>>>A new security bug in twiki showed up today:
>>>>>>>http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithInclude
>>>>>>>
>>>>>>>An attacker is able to execute arbitrary shell commands with the
>>>>>>>privileges of the web server process. The TWiki INCLUDE function
>>>>>>>enables a malicious user to compose a command line executed by the
>>>>>>>Perl backtick (`) operator.
>>>>>>>
>>>>>>>The rev parameter of the INCLUDE variable is not checked properly for
>>>>>>>shell metacharacters and is thus vulnerable to revision numbers
>>>>>>>containing pipes and shell commands. The exploit is possible on
>>>>>>>included topics with two or more revisions.
>>>>>>>
>>>>>>>Example INCLUDE variable exploiting the rev parameter:
>>>>>>>%INCLUDE{ "Main.TWikiUsers" rev="2|less /etc/passwd" }%
>>>>>>>
>>>>>>>The same vulnerability is exposed to all Plugins and add-ons that use
>>>>>>>TWiki::Func::readTopicText function to read a previous topic revision.
>>>>>>>This has been tested on TWiki:Plugins.RevCommentPlugin and
>>>>>>>TWiki:Plugins.CompareRevisionsAddon.
>>>>>>>
>>>>>>>If access to TWiki is not restricted by other means, attackers can use
>>>>>>>the revision function with or without prior authentication, depending
>>>>>>>on the configuration. 
>>>>>>>
>>>>>>>The Common Vulnerabilities and Exposures project has assigned the name
>>>>>>>CAN-2005-3056 to this vulnerability. Please include this number in any
>>>>>>>changelogs fixing this.
>>>>>>>
>>>>>>>
>>>>>>>-- System Information:
>>>>>>>Debian Release: testing/unstable
>>>>>>>APT prefers testing
>>>>>>>APT policy: (990, 'testing'), (500, 'unstable')
>>>>>>>Architecture: i386 (i686)
>>>>>>>Shell:  /bin/sh linked to /bin/bash
>>>>>>>Kernel: Linux 2.6.8-2-k7
>>>>>>>Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
>>>>>>>
>>>>>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDQoQ49n4qXRzy1ioRAq3qAJ0Unv67KRVRhspysHwYVSPMcgREXQCgnErl
dQYbLhUMHN1nVASNCDzWAew=
=Ew1E
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to