Hi,

On Tue, June 3, 2008 18:26, Thomas Arendsen Hein wrote:
> Package: reportbug
> Version: 3.31
> Severity: grave
> Tags: security
> Justification: user security hole
>
>
> sys.path = [os.curdir, '/usr/share/reportbug'] + sys.path
>
> To "exploit":
> $ echo 'raise "FOO"' > token.py
> $ reportbug

Can you explain how this is a practical user security hole? Your exploit
shows how to "exploit yourself", but it seems very unlikely to me that an
attacker can
1) create a file token.py
2) make sure the user is in that curdir
3) AND invoke reportbug.

That seems rather contrived to me.


Thijs




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to