On Fri, 19 Aug 2022, Nick via Exim-users wrote:

Hello Exim users,

I've a problem with Sqlite lookups and tainting. I've composed a question on Stack Exchange, since it's easier to access than this list (and I forgot i was already subscribed here long ago!)

https://serverfault.com/questions/1108609/does-exim4s-sqlite-quote-expansion-de-taint-the-expanded-value

Quoting that here:

I'm upgrading an exim4 installation which has some custom filters, to Debian 11. (Specifically, the filters are this <https://github.com/wu-lee/exim-disposable-aliases>.)
q>>
Since that uses Exim 4.94, I've now run into the new-ish "tainted variables" <https://www.exim.org/exim-html-current/doc/html/spec_html/ch-concept_index.html> feature, which has broken my filter. Checking Exim in debug mode with |exim4 -bdf -d+filter| the error is referring to a tainted filename (some linebreaks added for readability):

|102536 LOG: MAIN PANIC 102536 Tainted filename for search '/var/spool/exim4/db/disposable-aliases.db' 102536 Filter error: failed to expand "${lookup sqlite{/var/spool/exim4/db/disposable-aliases.db \ select default_remaining from stem_configs \ where stem = '${quote_sqlite:$local_part}'} {$value}{0}}" in add command: NULL 102536 Filter: end of processing |

In this case, the reference to a filename /seems/ to be spurious, as firstly the filename is hard-wired (so can't be tainted?) and secondly, if I replace the |'${quote_sqlite:$local_part}'| portion of the query with a literal value, the error stops (at least from this particular lookup).

My suspicion therefore is that it's actually the presence of |$local_part| in the query which is the problem, and not the filename.

Agreed.

I have discovered there's an untainted version of |$local_part| available in some circumstances, |$local_part_data| - however in my circumstance, it isn't being set and so isn't useful.

More searching finds this assertion in the Exim4 documentation here <https://www.exim.org/exim-html-current/doc/html/spec_html/ch-file_and_database_lookups.html>:

    If tainted data is used in the query then it should be quuted
    [sic] by using the ${quote_:} expansion operator appropriate for
    the lookup.

This seems to imply that the |${sqlite_quote: .. }| expansion should be de-tainting the content of |$local_data|. That would seem sensible, but is this actually correct, given that if I replace the expansion with a literal the tainting problem stops?

If |${sqlite_quote: .. }| really is de-tainting its result, then what is causing this look-up to be rejected?

Did you mean quote_sqlite ?
spec.txt 9.26 says:
    The only character affected by the quote_sqlite
    operator is a single quote, which it doubles.
so I doubt that it is intended to detaint,
but my knowledge of SQL is very limited.

If it is not, then what other recourse do I have? The sqlite look-up above is actually /designed/ to validate the local part against a list of valid values stored in the database, and should be able to de-taint the value!

Looking again at section 9.26, you are using the deprecated method of specifying
the filename. If you replace
    ${lookup sqlite{DISP_ALIASES_DB
with
    ${lookup sqlite,file=DISP_ALIASES_DB {
(in about a dozen places) or set the sqlite_dbfile main option
rather than specifying the filename in each lookup, I think that will satisfy 
exim.
However I am not certain that it will guarantee to avoid looking up Bobby 
Tables.

Thanks!

Nick

--
Andrew C. Aitchison                      Kendal, UK
                   and...@aitchison.me.uk

--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to