Cajus Pollmeier skrev:
> Am Donnerstag 07 Dezember 2006 14:37 schrieb Finn-Arne Johansen:
>> Package: gosa
>> Version: 2.5.6-2
>> Severity: critical
>> Tags: security
>> Justification: root security hole
>>
>>
>> The documentation in gosa tells the admin to install gosa.conf under
>> /etc/gosa/gosa.conf, and to make it readable by the group www-data.
>> In this configuration file, the ldap admin password is stored in
>> cleartext. Any process running under the web process can now read that
>> file, and if the same ldap users was used for authenticating , it would
>> be rather easy to create a user with root access.
>>
>> this litle script placed under my ~/public_html/ revealed the password
>> on my server
>>   <?php system ('cat /etc/gosa/gosa.conf') ; ?>
> 
> So, do you have another solution, actually? Any web application that stores 
> information about passwords has the same problem, you can simply get 
> passwords to mysql databases, etc.
> 
> Don't use public stuff on these administrative servers. I'm not responsible 
> for configuring your PHP installation, i.e. use PHPs secure mode to avoid 
> these cases.

Please add these notes to the explenation or at least to the
README.Debian file

Someone thought about adding gosa as the user admin tool for Debian-Edu,
until I pointed this out.


-- 
Finn-Arne Johansen
[EMAIL PROTECTED] http://bzz.no/
EE2A71C6403A3D191FCDC043006F1215062E6642 062E6642



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to