@John - Quite agree. It's not just scripts that need checking either. Very
unsettling to have a vulnerable version of bash on every system vm, many
with direct access to both the CS infrastructure as well as client VMs. All
it takes is for someone to find another vector (e.g. DHCP, DNSmasq) other
than a script to inject system variables and there's suddenly a MUCH bigger
problem.

Is there no way to simply update the version of bash included with the
system vm template? At the moment it seems to be version 4.2.37 which is
vulnerable (based on
http://cloudstack.apt-get.eu/systemvm/4.4/systemvm64template-4.4.1-7-vmware.ova).

I'm not too familiar with what happens to the template as it's deployed but
if I log in as root/password to the system vm template running as downloaded
in VMware Workstation and 'echo $SHELL' I get '/bin/bash' even though
'/bin/sh' is a symlink to '/bin/dash'.

Perhaps someone is already working quietly on this but surely this should be
treated as a fairly major priority? I'd far rather not have bombs in every
system vm in the first place regardless of whether people think there aren't
any detonators.

Adrian

-----Original Message-----
From: John Kinsella [mailto:j...@stratosec.co]
Sent: 30 September 2014 22:57
To: dev@cloudstack.apache.org
Subject: Re: Shellshock

I’m not worried about any specific use-case, but I’d rather not have
vulnerable software running on SSVMs in general.

John

On Sep 30, 2014, at 2:47 PM, Sheng Yang
<sh...@yasker.org<mailto:sh...@yasker.org>> wrote:

The parameters of system() function have been verified as valid IP/netmask
format by script, so I don't think other parameters would be able to slip in
in this case.

--Sheng

On Tue, Sep 30, 2014 at 8:38 AM, Go Chiba
<go.ch...@gmail.com<mailto:go.ch...@gmail.com>> wrote:

Hi folks,

By my digging, ipcalc included system() function call but debian based our
system vm are using dash as system shell. So I think this shellshock concern
are not directly affected to system vm cgi-bin. right?

GO

from my iPhone

2014/09/30 10:13、Demetrius Tsitrelis
<demetrius.tsitre...@citrix.com<mailto:demetrius.tsitre...@citrix.com>>
のメッセージ:

http://systemvm-public-ip/cgi-bin/ipcalc is a perl script.

-----Original Message-----
From: Sheng Yang [mailto:sh...@yasker.org]
Sent: Monday, September 29, 2014 5:21 PM
To: <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>>
Subject: Re: Shellshock

http://systemvm-public-ip/cgi-bin/ipcalc is NOT a bash script, so it's
normal that it cannot be exploited.

--Sheng

On Fri, Sep 26, 2014 at 1:57 PM, Demetrius Tsitrelis <
demetrius.tsitre...@citrix.com<mailto:demetrius.tsitre...@citrix.com>>
wrote:

Do you mean you tried setting the USER_AGENT like in
https://community.qualys.com/blogs/securitylabs/2014/09/25/qualysguard
-remote-detection-for-bash-shellshock
?


-----Original Message-----
From: Ian Duffy [mailto:i...@ianduffy.ie]
Sent: Friday, September 26, 2014 6:56 AM
To: CloudStack Dev
Subject: Re: Shellshock

Tried this against the latest system vms built on Jenkins.

Didn't get a successful exploited response. Tested against http://systemvm
- public-ip/cgi-bin/ipcalc
On 25 Sep 2014 16:56, "Abhinandan Prateek" <agneya2...@gmail.com>
wrote:


After heart bleed we are Shell shocked
http://www.bbc.com/news/technology-29361794 !
It may not affect cloudstack directly as it is a vulnerability that affects
bash, and allows the attacker to take control of the system running bash
shell.

-abhi



Stratosec - Secure Finance and Heathcare Clouds http://stratosec.co
o: 415.315.9385
@johnlkinsella<http://twitter.com/johnlkinsella>

Reply via email to