Bug 789196 (CVE-2012-0842) - CVE-2012-0842 surf: world-readable cookie file
Summary: CVE-2012-0842 surf: world-readable cookie file
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2012-0842
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 789197
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-02-10 04:19 UTC by Vincent Danen
Modified: 2019-09-29 12:50 UTC (History)
1 user (show)

Fixed In Version: surf 0.5
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-01-30 11:11:47 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2012-02-10 04:19:26 UTC
A Debian bug report [1] indicated that surf would create the cookies storage file with world readable permissions.  This could allow other local users to steal cookies if the user had non-default permissions on their home directory (by default, home directories are mode 0700 but may be 0755 in some cases, like for Apache user directories).

$ ls -al ~/.surf/
total 12
drwxr-xr-x.  2 parallels parallels 4096 Feb  9 21:14 .
drwx------. 22 parallels parallels 4096 Feb  9 21:14 ..
-rw-rw-r--.  1 parallels parallels  312 Feb  9 21:14 cookies.txt

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659296

Comment 1 Vincent Danen 2012-02-10 04:20:20 UTC
Created surf tracking bugs for this issue

Affects: fedora-all [bug 789197]

Comment 2 Vincent Danen 2012-02-10 15:27:43 UTC
This was assigned the name CVE-2012-0842:

http://seclists.org/oss-sec/2012/q1/407

Comment 3 Simon 2013-01-30 11:11:47 UTC
fixed in surf 0.5
http://git.suckless.org/surf/commit/?id=a0e269b6bd9d7a70148f4ccbc733df35f071ba74
--
surf is now 0.5-1 in fedora
Updated by François Cami
Available in rawhide and fedora-18-updates
https://admin.fedoraproject.org/updates/FEDORA-2013-0674/surf-0.5-1.fc18
--
!!!Thank you for this bug report!!!

Comment 4 Vincent Danen 2013-01-30 19:04:30 UTC
Thank you for the heads-up, Simon.


Note You need to log in before you can comment on or make changes to this bug.