Package: midgard2-common
Version: 10.05.7.1-2
Severity: critical
Tags: security
X-Debbugs-Cc: secur...@debian.org

I notified the Debian security team before public disclosure, and the
Debian maintainer is already aware, but for completeness, here is a
Debian bug:

On 05/01/15 15:07, Simon McVittie wrote:
> Type of vulnerability: CWE-284 Improper Access Control
> Exploitable by: local users
> Impact: could allow arbitrary code execution as root (dependent on
> installed D-Bus system services)
> Reporter: Simon McVittie, Collabora Ltd.
> Upstream notified: 2014-12-19
> 
> Midgard2 is an open source content repository for data-intensive web and
> desktop applications.
> 
> While checking Debian for incorrect/dangerous D-Bus security policy
> files (found in /etc/dbus-1/system.d/*.conf) I found this access control
> rule in midgard2-common/10.05.7.1-2, part of the upstream project
> midgard-core:
> 
> <policy context="default">               <==== "applies to everyone"
>   <allow own="org.midgardproject" />     <==== probably undesired
>   <allow send_type="method_call"/>       <==== definitely bad
>   <allow send_type="signal" />           <==== not good either
> </policy>
> 
> This is analogous to an overly permissive "chmod": it allows any process
> on the system bus to send any method call or signal to any other process
> on the system bus, including those that are normally forbidden either
> explicitly or via the system bus' documented default-deny policy. Some
> D-Bus system services perform additional authorization checks, either
> via Polkit/PolicyKit or internally, but many services rely on the system
> bus to apply their intended security model.
> 
> For instance, depending on installed software, this vulnerability could
> allow unprivileged local users to:
> 
> * invoke Avahi's SetHostName() method
> * communicate with bluetooth devices using BlueZ
> * install printer drivers using system-config-printer
> * run NetworkManager "dispatcher" scripts
> * ...
> 
> It seems likely that at least one of these services can be used for
> arbitrary code execution as root, making this a severe vulnerability.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to