Finn-Arne Johansen wrote:
> Package: gosa
> Version: 2.5.6-2
> Severity: critical
> Tags: security
> Justification: root security hole
>
>
> The documentation in gosa tells the admin to install gosa.conf under
> /etc/gosa/gosa.conf, and to make it readable by the group www-data.
> In this configuration file, the ldap admin password is stored in
> cleartext. Any process running under the web process can now read that
> file, and if the same ldap users was used for authenticating , it would
> be rather easy to create a user with root access.
Honestly, what solution would you propose for a process running as
www-data to access a password which can not be read by other processes
running as www-data?
> this litle script placed under my ~/public_html/ revealed the password
> on my server
> <?php system ('cat /etc/gosa/gosa.conf') ; ?>
As usual, it's sad, but if you allow random users to use self-written
PHP scripts, they can access everything that the www-data user can
access. It may be different with suhosin.
As a general rule, users don't belong on services machines, if you
want to avoid such problems.
Regards,
Joey
--
Long noun chains don't automatically imply security. -- Bruce Schneier
Please always Cc to me when replying to me on the lists.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]