emacs-bug-tracker
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

bug#59817: closed ([PATCH] Fix etags local command injection vulnerabili


From: GNU bug Tracking System
Subject: bug#59817: closed ([PATCH] Fix etags local command injection vulnerability)
Date: Tue, 06 Dec 2022 16:16:02 +0000

Your message dated Tue, 06 Dec 2022 18:14:43 +0200
with message-id <83359s7bm4.fsf@gnu.org>
and subject line Re: bug#59817: [PATCH] Fix etags local command injection 
vulnerability
has caused the debbugs.gnu.org bug report #59817,
regarding [PATCH] Fix etags local command injection vulnerability
to be marked as done.

(If you believe you have received this mail in error, please contact
help-debbugs@gnu.org.)


-- 
59817: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=59817
GNU Bug Tracking System
Contact help-debbugs@gnu.org with problems
--- Begin Message --- Subject: [PATCH] Fix etags local command injection vulnerability Date: Sun, 4 Dec 2022 21:51:13 +0800
Hi, this patch fix a new local command injection vulnerability in the
etags.c.

This vulnerability occurs in the following code:

        #if MSDOS || defined (DOS_NT)
                 char *cmd1 = concat (compr->command, " \"", real_name);
                 char *cmd = concat (cmd1, "\" > ", tmp_name);
        #else
                 char *cmd1 = concat (compr->command, " '", real_name);
                 char *cmd = concat (cmd1, "' > ", tmp_name);
        #endif
                 free (cmd1);
                 inf = (system (cmd) == -1
                        ? NULL
                        : fopen (tmp_name, "r" FOPEN_BINARY));
                 free (cmd);
               }

Vulnerability #1:

for tmp_name variable, the value from the etags_mktmp() function, this
function takes the value from the environment variable `TMPDIR`, `TEMP`
or `TMP`, but without checking the value. So, if then hacker can
control these environment variables, can execute the shell code.

Attack example:

$ ls
etags.c
$ zip etags.z etags.c
  adding: etags.c (deflated 72%)
$ tmpdir="/tmp/;uname -a;/"
$ mkdir $tmpdir
$ TMPDIR=$tmpdir etags *
sh: line 1: /tmp/: Is a directory
Linux mypc 6.0.10-300.fc37.x86_64 #1 SMP PREEMPT_DYNAMIC Sat Nov 26
16:55:13 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux sh: line 1: /etECggCJ:
No such file or directory etags: skipping inclusion of TAGS in self.

Vulnerability #2:

If the target file is a compressed file, execute system commands (such
as gzip, etc.), but do not check the file name. 

Attack example:

$ ls
etags.c
$ zip "';uname -a;'test.z" etags.c  <--- inject the shell code to
filename
adding: etags.c (deflated 72%)
$ etags *
gzip: .gz: No such file or directory
Linux mypc 6.0.10-300.fc37.x86_64 #1 SMP PREEMPT_DYNAMIC Sat Nov 26
16:55:13 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux sh: line 1: test.z:
command not found

I fix this vulnerability. By create a process, instead of call the
sh or cmd.exe, and this patch work the Linux, BSD and Windows.

Attachment: 0001-Fix-etags-local-command-injection-vulnerability.patch
Description: Text Data


--- End Message ---
--- Begin Message --- Subject: Re: bug#59817: [PATCH] Fix etags local command injection vulnerability Date: Tue, 06 Dec 2022 18:14:43 +0200
> Date: Tue, 6 Dec 2022 23:49:05 +0800
> From: lux <lx@shellcodes.org>
> Cc: stefankangas@gmail.com, 59817@debbugs.gnu.org
> 
> >From d1dd12396b7d99ff93e6a846c96ae600addac847 Mon Sep 17 00:00:00 2001
> From: lu4nx <lx@shellcodes.org>
> Date: Tue, 6 Dec 2022 15:42:40 +0800
> Subject: [PATCH] Fix etags local command injection vulnerability
> 
> * lib-src/etags.c:
> 
> (escape_shell_arg_string): New function.

Thanks, installed with some minor changes.


--- End Message ---

reply via email to

[Prev in Thread] Current Thread [Next in Thread]