[3716] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Hole: nobody shell

daemon@ATHENA.MIT.EDU (scott hollatz)
Thu Dec 5 12:39:26 1996

From: scott hollatz <shollatz@d.umn.edu>
Date: Thu, 5 Dec 1996 09:24:43 -0600
To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

>> We give 'nobody' the same login shell as anonymous ftp:  /nosuchshell ,
>> where '/nosuchshell' is a nonexistent file.  This prevents the giving an
>> unauthenticated shell via an xterm.
>
>This doesn't sound like too good of an idea to me... I would think that
>all it would take would be to hack a /nosuchshell file as #!/bin/bash, and
>your in.. Whats wrong with /dev/null or /bin/false, or some other file
>that exists, but cannot be written over?
>
>I actually suppose it may be the same thing -- that is, creating a
>/nosuchshell on root, where a normal user does not have permission, or
>changing the contents of /bin/false, where he has the same write
>permissions.  Maybe /dev/null...

Lively discussion on this by many people.

I should have clarified the server environment.  It runs on a host where
only a few system admins can log onto it and all CGI programs go through
me for security checks before they are made live.  In fact, all pages undergo
a review and must be approved if they are to put onto the host.
--
scott hollatz                         internet   shollatz@d.umn.edu
information services, systems        telephone   +1 218 726 8851
university of minnesota-duluth mn usa      fax   +1 218 726 7674
                                   "change is a universal constant"

home help back first fref pref prev next nref lref last post