On Sun, 23 Sep 2001, Geoff Hutchison wrote:

+ There is a security vulnerability in all versions of htsearch between
+ 3.1.0b2 and 3.1.5, including all versions of the 3.2.0b1 through
+ 3.2.0b3. The hole can allow a remote user to pick a file on your system
+ for the config file that the UID running the webserver can read. In the
+ case of a user with local access as well, this could enable local file
+ disclosure.

Could I trouble you to show us just what the exploit looks like please?

I think my setup will be impervious to this exploit because I never
invoke htsearch directly, only via a wrapper that verifies the config file
name matches the alias by which the script has been invoked - I have one
wrapper script and an 'ln -s' for each permitted config file. The real
htsearch isn't in my cgi-bin directory, htsearch in my cgi-bin is a dummy
that just emails me the @ENV details of the caller.

That said, it would be nice to confirm my setup foils the exploit and
that I can rest easy until a 3.1.6 binary RPM is released.

regards,
        Malcolm.

 [EMAIL PROTECTED]     http://users.ox.ac.uk/~malcolm/



_______________________________________________
htdig-general mailing list <[EMAIL PROTECTED]>
To unsubscribe, send a message to <[EMAIL PROTECTED]> with a 
subject of unsubscribe
FAQ: http://htdig.sourceforge.net/FAQ.html

Reply via email to