Source: python-pastescript
Version: 1.7.5-1
Severity: grave
Tags: security patch

Hello,
below is a (shortened) report about a vulnerability in python-pastescript. As 
far as I can see we are affected by this.

Kind regards
Nico

----- Forwarded message from Jan Lieskovsky <jlies...@redhat.com> -----

Hello Kurt, Steve, vendors,

  a security flaw was found in the way Paster, a pluggable command-line 
frontend,
when started as root (for example to have access to privileged port) to serve a
web based application, performed privileges dropping upon startup
(supplementary groups were not dropped properly regardless of the UID, GID
specified in the .ini configuration file or in the --user and --group CL
arguments). A remote attacker could use this flaw for example to read / write
root GID accessible files, if the particular web application provided remote
means for local file manipulation.

Credit / Issue Reported by: Clay Gerrard

References:
[1] 
http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471
[2] https://bugzilla.redhat.com/show_bug.cgi?id=796790

Patch proposed by the issue reporter:
[3] 
https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve

Upstream patch:
[4] https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4

----- End forwarded message -----

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpZTrwdHMLka.pgp
Description: PGP signature

Reply via email to