On sabato 13 gennaio 2018 23:55:16 CET, Luca Beltrame wrote:
(please keep Fabian in CC, he's not subscribed and found out most of the issues reported here)

At openSUSE we have to request reviews by the security team before
new polkit services get accepted. This is the case for the kio kauth helper as well. While the security team raised concerns with the wide capabilities of the helper (it can easily be used to do literally everything), we had a look at the implementation itself to find some obvious security issues:

- The privilege is persistent for the entire session

No, it's not. Despite the name, 'Persistence=session' just means the privilege is kept for a few minutes.

(already fixed).

Why 029da62886e0 was committed without code review?

- The confirmation prompt for the kauth action use does not tell what is going to happen. So you might open a file dialog and then instead of opening a file, write to /bin/sh.
- Trivial stack-based buffer overflow in the kauth helper:
  https://cgit.kde.org/kio.git/tree/src/ioslaves/file/sharefd_p.h#n57
- The socket used to send and receive file descriptors does not have any kind of permission check. You can easily send fds to and receive fds from users of the kauth helper on the same machine. (BTW, SocketAddress::length should return the actual length of the buffer, currently it adds ~100 '\0' bytes to the end)

In its current state we can not recommend anyone to enable this.
However, we hope that those issues can be addressed, it does provide some useful functionality.

Is someone already working on fixes for the above issues?


Luca Beltrame
on behalf of the openSUSE KDE Team

Cheers,
Elvis

Reply via email to