Your message dated Thu, 23 Oct 2008 15:27:51 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#423441: fixed in blosxom 2.0-14+etch1
has caused the Debian Bug report #423441,
regarding blosxom: param("-f") for exec introduces security hole
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
423441: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=423441
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: blosxom
Version: 2.0-14
Severity: grave
Tags: security
Justification: user security hole


On line 69, param("-f") is used as a potential configuration file:

for $rcfile ("/etc/blosxom/blosxom.conf", "/etc/blosxom.conf", param("-f")) {
  if (-r $rcfile) {
    open (RC, "< $rcfile") or die "Cannot open $rcfile: $!";
    while (<RC>) {
      eval("$_");
    }
    close (RC);
  }
}

This means (among other things) that a malicios user can use a URL like:

  http://mycomputer/cgi-bin/blosxom?-f=/home/malicioususer/exploit.pl

to execute arbitrary code as whomever runs cgi scripts.

I emailed the credited author of this debian-specific chunk of code, who
said he wrote it to be used from the command-line.  Indeed, when run from
the command-line, you can use

  $ blosxom -f=/path/to/blosxom.conf

but this is just passing URL-encoded form data on the command line and
IMHO is an abuse of a feature in the CGI module to make testing easier.
As debian installs blosxom into /usr/lib/cgi-bin/ it is clearly going to
be run by many people as a CGI.

In fact there are inappropriate calls to param() all over the place.
This one just happens to introduce a security hole.  I think I'll use
pyblosxom instead.  :)

Sorry, no patches, perl scares me.


-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (990, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.20-linode28
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages blosxom depends on:
ii  debconf [debconf-2.0]         1.5.11     Debian configuration management sy
ii  perl                          5.8.8-7    Larry Wall's Practical Extraction 

Versions of packages blosxom recommends:
ii  apache2-mpm-prefork [httpd]   2.2.3-4    Traditional model for Apache HTTPD

-- debconf information:
  blosxom/breakage:
  blosxom/old_cgi_file: false


--- End Message ---
--- Begin Message ---
Source: blosxom
Source-Version: 2.0-14+etch1

We believe that the bug you reported is fixed in the latest version of
blosxom, which is due to be installed in the Debian FTP archive:

blosxom_2.0-14+etch1.diff.gz
  to pool/main/b/blosxom/blosxom_2.0-14+etch1.diff.gz
blosxom_2.0-14+etch1.dsc
  to pool/main/b/blosxom/blosxom_2.0-14+etch1.dsc
blosxom_2.0-14+etch1_all.deb
  to pool/main/b/blosxom/blosxom_2.0-14+etch1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Gerfried Fuchs <[EMAIL PROTECTED]> (supplier of updated blosxom package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 06 Oct 2008 16:01:44 +0200
Source: blosxom
Binary: blosxom
Architecture: source all
Version: 2.0-14+etch1
Distribution: stable
Urgency: high
Maintainer: Pascal Hakim <[EMAIL PROTECTED]>
Changed-By: Gerfried Fuchs <[EMAIL PROTECTED]>
Description: 
 blosxom    - light, feature-packed weblog app with plugin extensibility
Closes: 423441 500873
Changes: 
 blosxom (2.0-14+etch1) stable; urgency=high
 .
   * Apply patch to fix Cross-Site Scripting (XSS) vulnerability with respect
     to unknown flavours (CVE-2008-2236) (closes: #500873)
   * Only use param("-f") if $ENV{GATEWAY_INTERFACE} isn't set
     (closes: #423441)
Files: 
 1967039427f10e01f9d4731e2ceb22a4 621 web optional blosxom_2.0-14+etch1.dsc
 8b48b28026847656cd68eda0c2c8bf3d 19727 web optional 
blosxom_2.0-14+etch1.diff.gz
 eac216663aed042c2ff78c3bd8e9d685 30202 web optional 
blosxom_2.0-14+etch1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkjqSnUACgkQELuA/Ba9d8Y8RgCePsF7cvo0xqtvWsMRZUF75A13
AOYAnjPhCyMKf2Av98tnGvlQc7D6v8YM
=wWTb
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to