[Secure-testing-team] Bug#500181: chillispot: symlink attack can be launched via postinst

Raphael Geissert atomo64 at gmail.com
Thu Sep 25 19:17:17 UTC 2008


Package: chillispot
Version: 1.0-9
Severity: grave
Tags: security

From postinst:

8<------------------------------------------>8
# config file
CONFIGFILE=/etc/chilli.conf
# upstream config file
TEMPCONFIG=/tmp/chilli.conf
...
# unpack upstream config
zcat /usr/share/doc/chillispot/chilli.conf.gz > $TEMPCONFIG
...
         echo "NOTE:"
         echo "You have choosed to edit configuration by hand.";
         echo "A default configuration will be available on '/etc/chilli.conf'";

         if [ ! -e $CONFIGFILE ]; then
                  mv $TEMPCONFIG $CONFIGFILE
         else
                  ucf $TEMPCONFIG $CONFIGFILE
         fi
else
...
        -e "s/^(#)?uamhomepage.*/uamhomepage\ $uam_homepage/" \
        -e "s/^(#)?uamsecret.*/uamsecret\ $uam_secret/" \
                  < $TEMPCONFIG > $tempfile

         if [ ! -e $CONFIGFILE ]; then
                  mv $tempfile $CONFIGFILE
         else
                  ucf $tempfile $CONFIGFILE
         fi
8<------------------------------------------>8


Putting a symlink in place can help nuking another file's content, or even modifying the program's config file to the attacker's will.

Cheers,
-- 
Atomo64 - Raphael

Please avoid sending me Word, PowerPoint or Excel attachments.
See http://www.gnu.org/philosophy/no-word-attachments.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: This is a digitally signed message part.
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080925/4eb79624/attachment.pgp 


More information about the Secure-testing-team mailing list