Hi Thijs,
* Thijs Kinkhorst <[EMAIL PROTECTED]> [2008-06-04 12:52]:
> On Tue, June 3, 2008 18:26, Thomas Arendsen Hein wrote:
> > Package: reportbug
> > Version: 3.31
> > Severity: grave
> > Tags: security
> > Justification: user security hole
> >
> >
> > sys.path = [os.curdir, '/usr/share/reportbug'] + sys.path
> >
> > To "exploit":
> > $ echo 'raise "FOO"' > token.py
> > $ reportbug
> 
> Can you explain how this is a practical user security hole? Your exploit
> shows how to "exploit yourself", but it seems very unlikely to me that an
> attacker can
> 1) create a file token.py
> 2) make sure the user is in that curdir
> 3) AND invoke reportbug.
> 
> That seems rather contrived to me.

I agree that it is of a low impact but I disagree that this 
is not a security issue, people are using reportbug in /tmp 
and I don't see a reason to assume people are not doing 
that.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpUWpHg5u7rz.pgp
Description: PGP signature

Reply via email to