Your message dated Thu, 29 Sep 2005 20:42:40 +0200 with message-id <[EMAIL PROTECTED]> and subject line Bug#330733: twiki: INCLUDE function allows arbitrary shell command execution has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 29 Sep 2005 15:48:47 +0000 >From [EMAIL PROTECTED] Thu Sep 29 08:48:47 2005 Return-path: <[EMAIL PROTECTED]> Received: from mail.riseup.net [69.90.134.155] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1EL0eM-0005Tc-00; Thu, 29 Sep 2005 08:48:47 -0700 Received: from localhost (localhost [127.0.0.1]) by mail.riseup.net (Postfix) with ESMTP id E6CFAA2DF6; Thu, 29 Sep 2005 08:48:19 -0700 (PDT) Received: from mail.riseup.net ([127.0.0.1]) by localhost (buffy [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 03753-06; Thu, 29 Sep 2005 08:48:19 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.riseup.net (Postfix) with ESMTP id B1271A2D80; Thu, 29 Sep 2005 08:48:19 -0700 (PDT) Received: by pond (Postfix, from userid 1000) id 6BDAC3A847; Thu, 29 Sep 2005 11:28:23 -0400 (EDT) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Micah Anderson <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: twiki: INCLUDE function allows arbitrary shell command execution X-Mailer: reportbug 3.17 Date: Thu, 29 Sep 2005 11:28:23 -0400 X-Debbugs-Cc: Debian Security Team <[EMAIL PROTECTED]> Message-Id: <[EMAIL PROTECTED]> X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at riseup.net Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02 Package: twiki Version: 20040902-3 Severity: grave Tags: security Justification: user security hole A new security bug in twiki showed up today: http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithInclude An attacker is able to execute arbitrary shell commands with the privileges of the web server process. The TWiki INCLUDE function enables a malicious user to compose a command line executed by the Perl backtick (`) operator. The rev parameter of the INCLUDE variable is not checked properly for shell metacharacters and is thus vulnerable to revision numbers containing pipes and shell commands. The exploit is possible on included topics with two or more revisions. Example INCLUDE variable exploiting the rev parameter: %INCLUDE{ "Main.TWikiUsers" rev="2|less /etc/passwd" }% The same vulnerability is exposed to all Plugins and add-ons that use TWiki::Func::readTopicText function to read a previous topic revision. This has been tested on TWiki:Plugins.RevCommentPlugin and TWiki:Plugins.CompareRevisionsAddon. If access to TWiki is not restricted by other means, attackers can use the revision function with or without prior authentication, depending on the configuration. The Common Vulnerabilities and Exposures project has assigned the name CAN-2005-3056 to this vulnerability. Please include this number in any changelogs fixing this. -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (990, 'testing'), (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.8-2-k7 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) --------------------------------------- Received: (at 330733-done) by bugs.debian.org; 29 Sep 2005 18:43:15 +0000 >From [EMAIL PROTECTED] Thu Sep 29 11:43:14 2005 Return-path: <[EMAIL PROTECTED]> Received: from mail.enyo.de [212.9.189.167] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1EL3NC-0007lz-00; Thu, 29 Sep 2005 11:43:14 -0700 Received: from deneb.vpn.enyo.de ([212.9.189.177] helo=deneb.enyo.de) by albireo.enyo.de with esmtp id 1EL3N7-0004Vk-Pq; Thu, 29 Sep 2005 20:43:09 +0200 Received: from fw by deneb.enyo.de with local (Exim 4.52) id 1EL3Me-00069B-8z; Thu, 29 Sep 2005 20:42:40 +0200 From: Florian Weimer <[EMAIL PROTECTED]> To: Micah Anderson <[EMAIL PROTECTED]> Cc: [EMAIL PROTECTED] Subject: Re: Bug#330733: twiki: INCLUDE function allows arbitrary shell command execution References: <[EMAIL PROTECTED]> Date: Thu, 29 Sep 2005 20:42:40 +0200 In-Reply-To: <[EMAIL PROTECTED]> (Micah Anderson's message of "Thu, 29 Sep 2005 11:28:23 -0400") Message-ID: <[EMAIL PROTECTED]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 * Micah Anderson: > A new security bug in twiki showed up today: > http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithInclude This bug has already been fixed in Debian version 20040902-2, as far as I know. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]