On Fri, Aug 04, 2017 at 08:06:43PM +0000, brian m. carlson wrote:
> On Fri, Aug 04, 2017 at 06:16:53PM +0200, Nicolas Morey-Chaisemartin wrote:
> > static struct imap_store *imap_open_store(struct imap_server_conf *srvc,
> > char *folder)
> > {
> > struct credential cred = CREDENTIAL_INIT;
> > @@ -1090,7 +1116,7 @@ static struct imap_store *imap_open_store(struct
> > imap_server_conf *srvc, char *f
> > if (!srvc->user)
> > srvc->user = xstrdup(cred.username);
> > if (!srvc->pass)
> > - srvc->pass = xstrdup(cred.password);
> > + srvc->pass =
> > imap_escape_password(cred.password);
> > }
> >
> > if (srvc->auth_method) {
>
> I'm not sure if this is correct. It looks like this username and
> password are used by whatever authentication method we use, whether
> that's LOGIN or CRAM-MD5. I don't think we'd want to encode the
> password here before sending it through the CRAM-MD5 authenticator.
Yeah. This is an on-the-wire encoding issue, and should happen as part
of forming the protocol string to send. So:
imap_exec(ctx, NULL, "LOGIN \"%s\" \"%s\"", srvc->user, srvc->pass)
is probably where it needs to happen.
It looks like this issue is present in a lot of other places, too. Just
a few lines below I see:
imap_exec(ctx, NULL, "CREATE \"%s\"", ctx->name)
As an aside, these are all potential injection vulnerabilities, too.
E.g., if I specify my folder as
foo"\n. DELETE "bar
then we'd issue an accidental deletion. I doubt it's a big deal in
practice, as it's not common to feed attacker-controlled strings to
imap-send. But we should probably fix it anyway.
The right interface is probably to teach imap_exec() to take a
NULL-terminated list of items (rather than a format string) and then
quote each one appropriately.
-Peff