[15064] in bugtraq
Re: Cobalt Networks - Security Advisory - Frontpage
daemon@ATHENA.MIT.EDU (Neulinger, Nathan R.)
Fri May 26 00:22:01 2000
Mime-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Message-Id: <9DA8D24B915BD1118911006094516EAF053E569A@umr-mail02>
Date: Thu, 25 May 2000 13:44:05 -0500
Reply-To: "Neulinger, Nathan R." <nneul@UMR.EDU>
From: "Neulinger, Nathan R." <nneul@UMR.EDU>
X-To: BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
> When a site is uploaded with FP to a RaQ2/3, all of the files
> are owned by user "httpd" instead of a site-specific user.
> The Apache web server is also running as user "httpd". Cobalt
> uses cgiwrap to have CGIs run as the user that owns the CGI
> instead of "httpd", but it is trivial to bypass cgiwrap and
> run scripts as user "httpd".
Just wanted to clarify here - the "it is trivial to bypass cgiwrap" is not a
security flaw with CGIWrap, but with how the RaQ servers are set up.
-- Nathan