-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yes, defiantly
I have not found any way to exploit the debian package using any thus far found methods. Florians patch get in the way every time :) Sven micah wrote: > > Does this mean that the twiki (20040902-3) in Debian is not vulnerable > and this bug report can be closed? > > Micah > > Sven Dowideit wrote: > >>>while I think its very reasonable for you to send along these >>>advisories, and even doing so as a BTS bug wothout testing them >>> >>>I think its incredibly rude to do so without saying that you have not >>>tested it out. >>> >>>please, if you enter a bug report, tell the maintainer what you have or >>>have not done, that way they can deal more appropriatly with the issue >>> >>>(in the cases where the core issue has been dealt with (thanks to >>>Florian!) I'm very busy helping out upstream, and i'm sure this >>>situation _should_ apply to others (i object to the number of debian >>>maintainers that are not appropriatly active upstream) >>> >>>however, other than my rant :) thanks for the notification, its >>>important (i'm still notifying people now) >>> >>>Sven >>> >>>micah wrote: >>> >>> >>>>>Sven, >>>>> >>>>>I have not attempted to reproduce this in the debian package, I'm >>>>>tracking known vulnerabilities with the testing-security team. When I >>>>>see a new CVE id assigned to a package and no bugs filed on that package >>>>>regarding that CVE, and no entries in the changelogs noting that it has >>>>>been fixed, I tend to believe that it hasn't been because it is a rare >>>>>package maintainer who has security issues fixed before they are >>>>>discovered or announced. >>>>> >>>>>Additionally, the advisory indicates that the version in debian >>>>>(20040902-3) is affected, as the only versions it indicates are safe is >>>>>the TWikiRelease01Sep2004 patched with Florian Weimer's >>>>>UncoordinatedSecurityAlert23Feb2005 patches. Without any indication in >>>>>the BTS or in changelogs, I assume that the package is affected because >>>>>the version numbers typically are very good indicators. Admittedly, you >>>>>could very well have addressed this issue, and I have a feeling that you >>>>>have as Florian is very active in Debian. If so, I'd be happy to know >>>>>that, and we can close this bug, so I can note it in the >>>>>testing-security database. >>>>> >>>>>Unfortunately, if I had to try every exploit, even those without >>>>>published exploits, for every CVE assigned, there would be a net loss. I >>>>>understand that this means this is an annoyance to you to get a grave >>>>>bug report for something that you may have addressed, however it ends up >>>>>being a good thing because then we know for sure, and can better track >>>>>vulnerabilities in Debian. It is better to be asked once if this is an >>>>>issue and have it properly noted, than for Debian to not pay attention >>>>>to anything at all and be riddled with security holes. >>>>> >>>>>micah >>>>> >>>>> >>>>> >>>>>Sven Dowideit wrote: >>>>> >>>>> >>>>> >>>>>>>excellent. >>>>>>> >>>>>>>Micah, did you manage to reproduce this in the debian package at all? >>>>>>> >>>>>>>you see, the debian package is significantly more secure than the >>>>>>>upstream version, and as you've marked it as grave, I presume that you >>>>>>>have found a way to make it happen. (as when I had a go, i did not get >>>>>>>the exploit (i got a unhelpful, but correct error message "invalid >>>>>>>number argument at /usr/share/perl5/TWiki.pm line 3339.") >>>>>>> >>>>>>>could you please either tell me how to reproduce the problem in the >>>>>>>current debian package, or close it? >>>>>>> >>>>>>>Cheers >>>>>>> >>>>>>>Sven >>>>>>> >>>>>>>Micah Anderson wrote: >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>>>>Package: twiki >>>>>>>>>Version: 20040902-3 >>>>>>>>>Severity: grave >>>>>>>>>Tags: security >>>>>>>>>Justification: user security hole >>>>>>>>> >>>>>>>>>A new security bug in twiki showed up today: >>>>>>>>>http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithInclude >>>>>>>>> >>>>>>>>>An attacker is able to execute arbitrary shell commands with the >>>>>>>>>privileges of the web server process. The TWiki INCLUDE function >>>>>>>>>enables a malicious user to compose a command line executed by the >>>>>>>>>Perl backtick (`) operator. >>>>>>>>> >>>>>>>>>The rev parameter of the INCLUDE variable is not checked properly for >>>>>>>>>shell metacharacters and is thus vulnerable to revision numbers >>>>>>>>>containing pipes and shell commands. The exploit is possible on >>>>>>>>>included topics with two or more revisions. >>>>>>>>> >>>>>>>>>Example INCLUDE variable exploiting the rev parameter: >>>>>>>>>%INCLUDE{ "Main.TWikiUsers" rev="2|less /etc/passwd" }% >>>>>>>>> >>>>>>>>>The same vulnerability is exposed to all Plugins and add-ons that use >>>>>>>>>TWiki::Func::readTopicText function to read a previous topic revision. >>>>>>>>>This has been tested on TWiki:Plugins.RevCommentPlugin and >>>>>>>>>TWiki:Plugins.CompareRevisionsAddon. >>>>>>>>> >>>>>>>>>If access to TWiki is not restricted by other means, attackers can use >>>>>>>>>the revision function with or without prior authentication, depending >>>>>>>>>on the configuration. >>>>>>>>> >>>>>>>>>The Common Vulnerabilities and Exposures project has assigned the name >>>>>>>>>CAN-2005-3056 to this vulnerability. Please include this number in any >>>>>>>>>changelogs fixing this. >>>>>>>>> >>>>>>>>> >>>>>>>>>-- System Information: >>>>>>>>>Debian Release: testing/unstable >>>>>>>>>APT prefers testing >>>>>>>>>APT policy: (990, 'testing'), (500, 'unstable') >>>>>>>>>Architecture: i386 (i686) >>>>>>>>>Shell: /bin/sh linked to /bin/bash >>>>>>>>>Kernel: Linux 2.6.8-2-k7 >>>>>>>>>Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) >>>>>>>>> >>>>>>> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDQocnPAwzu0QrW+kRAkefAKCajM1zqAFYXcjG71Lziz+06CnwJQCdGtAP XEchJVRNsc7vPWFr/zvuEl4= =sPxV -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]