Bug#611680: dtc-xen - Remote authenticated root exploit

2011-03-26 Thread Thomas Goirand
On 03/26/2011 09:38 PM, Giuseppe Iuculano wrote: Under these conditions, there's no way something/someone malicious can connect to DTC-Xen and do the kind of exploit described in this bug. If someone wants to change the behavior of DTC-Xen and allow connections and control from VPS *users*, then

Bug#611680: dtc-xen - Remote authenticated root exploit

2011-03-26 Thread Giuseppe Iuculano
On 03/26/2011 02:00 PM, Thomas Goirand wrote: > I explained it already. The only thing that is supposed to connect to > the SOAP server of DTC-Xen is the DTC panel. DTC-Xen hasn't been I don't understand what do you mean. If I understood this bugs correctly, there is a SOAP server that accepts inc

Bug#611680: dtc-xen - Remote authenticated root exploit

2011-03-26 Thread Thomas Goirand
On 03/26/2011 07:55 PM, Giuseppe Iuculano wrote: Hi, Now, I can see that adding further checking on the Python dtc-xen SOAP server might enhance security as well, so I will write such checks anyway, and make it available in the next version of DTC-Xen. Wont fix Could you please explain why

Bug#611680: dtc-xen - Remote authenticated root exploit

2011-03-26 Thread Giuseppe Iuculano
Hi, > Now, I can see that adding further checking on the Python dtc-xen SOAP > server might enhance security as well, so I will write such checks > anyway, and make it available in the next version of DTC-Xen. > Wont fix Could you please explain why this is wontfix? I think this is a security is

Bug#611680: dtc-xen - Remote authenticated root exploit

2011-02-01 Thread Thomas Goirand
On 02/01/2011 04:33 PM, Bastian Blank wrote: > The daemon authenticates users, explicitely, not a given web frontend. > So it is designed to be reacheable by users. The author is myself, so I know what I'm talking about. DTC-Xen really is designed for its web front-end, and checks should be made t

Bug#611680: dtc-xen - Remote authenticated root exploit

2011-02-01 Thread Bastian Blank
On Tue, Feb 01, 2011 at 02:20:14PM +0800, Thomas Goirand wrote: > If you really think that there's some root exploit in any package, you > should contact the security team AND the upstream author (myself in this > case) *privately* to warn them about the issue, so a fix can be > published before di

Bug#611680: dtc-xen - Remote authenticated root exploit

2011-01-31 Thread Thomas Goirand
Hi Bastian, First of all, I'm really surprised to see the way you are submitting this bug report. I normally send a "thank you for this bug report" as an introduction to each bug sent against my package, but not in this case. It seems that you believe there's root exploits here, and yet, you are s

Bug#611680: dtc-xen - Remote authenticated root exploit

2011-01-31 Thread Bastian Blank
Package: dtc-xen Version: 0.5.13-3 Severity: grave Tags: security dtc-xen includes several command executions as root that uses unchecked user input in dtc-soap-server. | cmd = "/usr/sbin/dtc_kill_vps_disk %s %s" % (vpsname, imagetype) | output = commands.getstatusoutput(cmd) "imagetype" is the