I didn't have time yet to look at it thoroughly (or test it), but 
AFAICS you now check the file for existance before passing it to the 
shell. This should convert the remote command execution vuln into a 
local priviledge escalation. A local user can do

touch '/tmp/`touch /tmp/hello`'

and pass the filename to torrentflux and so get the command executed 
as user www-data. This is definitely less severe than before but IMHO 
still a bug. It would also convert any vulnerability to create a file 
with arbitrary name into a code execution vulnerability.

Cheers,
Stefan


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to