Guys,

>   $conffile = param('-f') unless $ENV{GATEWAY_INTERFACE};

I'm not really comfortable with this as a fix, since it still relies on
a CGI debugging feature to process arguments.

I've brought in the security team, which apparently should have been
done a long time ago.  I suspect they'll either back me up or provide an
even better solution.  But in any case, now we've got a crack team of
debian security dudes on the scene.

Security team: blosxom uses perl's CGI "param" function to process
command-line arguments.  This function, when not running under a web
server, will pull in command-line arguments as though they were CGI
fields.  It is clearly intended to be a debugging feature.  But since
blosxom uses it to process things like "-f: path to configuration file"
and, predictably, the configuration file is just perl code, an attacker
can use this to run arbitrary perl code that already exists on the
server, as the CGI user.

I did a better write-up in the bug report.

Neale


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to