[prev in list] [next in list] [prev in thread] [next in thread] 

List:       cgit
Subject:    Bash vulnerability (CVE-2014-6271)
From:       John Keeping <john () keeping ! me ! uk>
Date:       2014-09-24 19:27:20
Message-ID: 20140924192719.GA2555 () serenity
[Download RAW message or body]

In case anyone hasn't seen it yet, today's Bash vulnerability
(CVE-2014-6271) [0] may affect CGit servers.

I don't believe CGit in its default configuration will cause a shell to
be executed, but if you configure a filter then you may well be causing
a shell to be executed with the environment of the cgit process, which
will include user-specified variables such as the HTTP User-Agent
header.

The example syntax-highlighting.sh, about-formatting.sh and
commit-links.sh are vulnerable if /bin/sh on your system is a vulnerable
version of Bash.

I confirmed that I can echo arbitrary content from the User-Agent header
into the response on a CGit server I run which has custom filters
installed.

[0] http://seclists.org/oss-sec/2014/q3/650
_______________________________________________
CGit mailing list
CGit@lists.zx2c4.com
http://lists.zx2c4.com/mailman/listinfo/cgit
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic