[15064] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Cobalt Networks - Security Advisory - Frontpage

daemon@ATHENA.MIT.EDU (Neulinger, Nathan R.)
Fri May 26 00:22:01 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Message-Id:  <9DA8D24B915BD1118911006094516EAF053E569A@umr-mail02>
Date:         Thu, 25 May 2000 13:44:05 -0500
Reply-To: "Neulinger, Nathan R." <nneul@UMR.EDU>
From: "Neulinger, Nathan R." <nneul@UMR.EDU>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM

> When a site is uploaded with FP to a RaQ2/3, all of the files
> are owned by user "httpd" instead of a site-specific user.
> The Apache web server is also running as user "httpd".  Cobalt
> uses cgiwrap to have CGIs run as the user that owns the CGI
> instead of "httpd", but it is trivial to bypass cgiwrap and
> run scripts as user "httpd".

Just wanted to clarify here - the "it is trivial to bypass cgiwrap" is not a
security flaw with CGIWrap, but with how the RaQ servers are set up.

-- Nathan

home help back first fref pref prev next nref lref last post