Bug 1269780 - lsyncd: Direct mode allwos injecting unauthorized filesystem operations
lsyncd: Direct mode allwos injecting unauthorized filesystem operations
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1269781 1269782
  Show dependency treegraph
Reported: 2015-10-08 04:10 EDT by Adam Mariš
Modified: 2018-01-25 20:09 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2018-01-25 20:09:16 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2015-10-08 04:10:25 EDT
In the default-direct.lua file in the "event.etype == 'Move'" branch, instead of using a direct fork/exec, a shell is spawned. Its arguments aren't quoted so one can inject additional parameters using whitespace characters.

Original bug report containing reproducer and proposed patch:

Comment 1 Adam Mariš 2015-10-08 04:11:10 EDT
Created lsyncd tracking bugs for this issue:

Affects: fedora-all [bug 1269781]
Affects: epel-all [bug 1269782]
Comment 2 Jason Taylor 2017-04-12 09:53:50 EDT
I believe this issue can be closed as the versions in fedora/epel have all been patched/updated.


Note You need to log in before you can comment on or make changes to this bug.