On Thu, Jul 30, 2015 at 10:28:30AM +0100, Rainer Weikusat wrote:
> Didier Kryn <k...@in2p3.fr> writes:
> > Le 29/07/2015 16:35, a...@gulbrandsen.priv.no a écrit :
> >> Every last problem of sudo is taken seriously? Did you know that if
> >> someone has limited access, e.g. the right to install standard
> >> packages, then it is easy to leverage that to get complete
> >> access. Various packages run programs in $PATH as root, Firefox
> >> comes to mind, so just prepare $PATH and sudo apt-get install
> >> firefox.
> >>
> >> Sudo leaves the user's $PATH and the rest is just a matter of
> >> finding the right exploit.
> >>
> >> Was open for years, may still be open.
> >>
> >> Arnt
> >
> >     I don't understand the preventions against sudo. It is just up to
> > the administrator to take care, like for everything.
> >
> >     Wether execution of the command is allowed by sudo, by a setuid
> > bit or by policykit does not change the result. Sudo is simply the
> > most versatile method to allow/disallow actions, IMHO far easier to
> > configure than policykit. Don't forget that allowed commands may
> > (should) be specified with their absolute path, therefore bypassing
> > PATH.
> 
> According to some tests I did yesterday, sudo (at least the Debian sudo)
> won't allow specifying commands without a pathname so that's not an
> issue. But according to the manpage, the upstream sudo default policy
> wrt the PATH a user happens to be using when invoking sudo is "pass it
> one to the command executed by sudo". Should this command, in turn,
> execute some other command without an explicit pathname and use one of
> the PATH-searching functions to do so, this will effectively allow the
> invoking user to run any code 'as root' because he can use a PATH
> containing a directory with a suitably named file in it whose contents
> can be anything.
> 
> But that's no different from any other conceivable way to trick some
> program running with elevated privileges on behalf of an unprivileged
> user into running arbitrary code, it's just a simple and obvious way to
> do so which doesn't require any programming (skills) and the 
> solution is "Well, don't do that". Also, the Debian default configuration
> contains a
> 
> Defaults        
> secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
> 
> which means the user PATH won't be passed on unless someone explicitly
> choses to enable it.

So defining this secure_path means it's the PATH to be used for sudo?  
and if it's not defined it defaults to PATH?  Is it the same for su?
And where is this defined?

-- hendrik
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to