In any case, I'd like to get a patch (and perhaps 3.1.6) out relatively soon.

At 3:36 PM -0500 9/6/01, Gilles Detillieux wrote:
>variables like LD_LIBRARY_PATH?  The way I see it, if you can hack a CGI
>program's environment from a web client, then it's pretty near impossible
>to write a safe CGI program.

No, no. It's a two-fold attack. With shell access you change the 
environment and then the CGI is remotely vulnerable. Granted, I'm not 
sure how you do the attack--I sent a message to bugtraq asking if 
there were pointers (and outlined this discussion in general about 
CGIs).

>a local user hacks CONFIG_DIR, so what?  He can find a convoluted way
>of reading a local file that he could directly view with cat, more,
>less, vi, etc.  I don't see a hole there.

Keep in mind that a user doesn't have access to everything. If you 
can hijack a CGI, you might be able to read webserver config files, 
logs, etc. that could be unreadable to you. Yes, it'd be hard to

>See http://www.htdig.org/FAQ.html#q4.20

Hmm. Maybe.

>So, why are we supposed to use tweezers to fix a known and fairly obvious
>hole, and a sledgehammer to fix a more obscure one?

I'm not clear on why removing code involves a tweezers in one hand 
and a sledgehammer in another.

>But if we're going to go to such extremes, I think we need something more
>solid to base it on than a vague concern that the environment variables
>might get hacked, i.e. a plausible scenario of how one might do just that.

Look, it's a fine point. Personally, I'd much rather not have such 
explicit trust in an environment variable. Your points about 
LD_LIBRARY_PATH and so on are good, but I'll just say that if we 
leave CONFIG_DIR in there, I'm going to patch it on my copies. Call 
it paranoia if you like.

-Geoff

_______________________________________________
htdig-dev mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/htdig-dev

Reply via email to