Bug 1269780 - lsyncd: Direct mode allwos injecting unauthorized filesystem operations
lsyncd: Direct mode allwos injecting unauthorized filesystem operations
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20151007,repor...
: Security
Depends On: 1269781 1269782
Blocks:
  Show dependency treegraph
 
Reported: 2015-10-08 04:10 EDT by Adam Mariš
Modified: 2017-04-12 09:53 EDT (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2015-10-08 04:10:25 EDT
In the default-direct.lua file in the "event.etype == 'Move'" branch, instead of using a direct fork/exec, a shell is spawned. Its arguments aren't quoted so one can inject additional parameters using whitespace characters.

Original bug report containing reproducer and proposed patch:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801263
Comment 1 Adam Mariš 2015-10-08 04:11:10 EDT
Created lsyncd tracking bugs for this issue:

Affects: fedora-all [bug 1269781]
Affects: epel-all [bug 1269782]
Comment 2 Jason Taylor 2017-04-12 09:53:50 EDT
I believe this issue can be closed as the versions in fedora/epel have all been patched/updated.

JT

Note You need to log in before you can comment on or make changes to this bug.