** Changed in: hardy-backports
       Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to transmission in Ubuntu.
https://bugs.launchpad.net/bugs/500625

Title:
  Local file overwriting due to directory traversal

Status in Hardy Backports:
  Won't Fix
Status in transmission package in Ubuntu:
  Fix Released
Status in transmission source package in Lucid:
  Fix Released
Status in transmission source package in Hardy:
  Fix Released
Status in transmission source package in Intrepid:
  Fix Released
Status in transmission source package in Jaunty:
  Fix Released
Status in transmission source package in Karmic:
  Fix Released

Bug description:
  Binary package hint: transmission

  I've discovered a design flaw in the Transmission BitTorrent client
  that I would consider to be a security vulnerability.  The
  Transmission client permits arbitrary characters in the names of files
  included in torrents, including characters that allow directory
  traversal (such as "../").  In addition, the client does not prompt
  the user before overwriting existing files with the same name as a
  file that is to be downloaded via torrent.

  An attacker can create a malicious torrent file containing a file
  named specifically to overwrite important files on disk.  For example,
  "../.ssh/authorized_keys" could be provided as a filename included in
  a torrent, and Transmission will download the provided file and store
  it at that location (assuming the default download location of
  ~/Desktop), overwriting the preexisting keys file and potentially
  giving an attacker SSH access to the victim's machine.  If the user
  happens to be running Transmission as root (who knows?), the
  possibilities are even scarier.

  I have confirmed this behavior with a simple proof-of-concept torrent
  and text file, which I've attached.  To confirm behavior, download the
  EVIL text file (which is just a sentence of text), and open the
  attached .torrent file in a child directory.  For example, if EVIL is
  in "~/", open the .torrent from "~/Desktop".  The torrent should begin
  seeding.  From another machine, create a blank file (or any file,
  really) called EVIL at some location.  This file represents an
  existing file on disk, and presumably wouldn't be called "EVIL" in a
  real situation.  Note its contents, and open the .torrent file at a
  child directory, just as before.  Once the download starts, you should
  note that the EVIL file in the parent directory has been overwritten
  with the contents of the torrent's EVIL file.

  Clearly, the desired behavior is to download files into the current
  directory, not permitting any directory traversal, and perhaps
  prompting the user before overwriting existing data.  This could be
  easily fixed by stripping ".." from incoming file names.

  Although this attack requires a victim to open a malicious torrent
  file, because it does not require the victim to actually execute
  malicious code I would still consider it a security problem.  Torrents
  are very widespread, and it would be trivial to host a malicious
  torrent containing legitimate files alongside files designed to
  compromise a victim's system.  The fact that an attacker would have
  immediate knowledge of compromised victims via the torrent is
  especially dangerous.

  I confirmed this behavior in Transmission 1.75 on Karmic, using both
  the GTK interface and transmission-cli.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hardy-backports/+bug/500625/+subscriptions


-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to