On 02.09.2007, at 18:29, Florian Weimer wrote:

* Joachim Breitner:

This is an unfortunate interaction between scponly and Subversion, but not a real bug in any of the programs. The same problem arises when a scponly-restricted user uploads any form of executable contents. CGI
scripts are more common (and their so-called "PHP shells" which are
explicitly designed to exploit this).

I think it’s more than that. If I upload some executable, I still have
to find a way to actually execute it (e.g. a badly configured web
server). Using subversion, I execute anything in _any case_, making
scponly useless for it’s purpose.

You need write permission on the Subversion repository.  I think it's
pretty obvious that you can change the Subversion hook scripts once
you've got them.

But you can upload a private repository, trigger the hook
and remove it afterwards.

I believe this is a real security problem, and I'm not
quite sure how to fix this without disabling subversion
support. But granted, I wouldn't call it a bug, too.
It's no flaw in any of the programs involved, rather it
is a constellation noone thought of before.


There are tons of programs which will lead to a similar
situation--basically anything that reads a user-specific
configuration file.

Well, reading a file is harmless compared to running
arbitrary scripts.

Tom





Reply via email to