Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: Apps :: gnatsw~1.htm

Gnatsweb.pl unchecked user input



Vulnerability

    Gnatsweb

Affected

    Gnatsweb 2.7beta, 2.8.0, 2.8.1, 3.95 for GNATS 4, versions from CVS prior to June 26

Description

    Joost Pol  found   following.   In Gnatsweb  2.7 beta,  a new help
    system was introduced.  The  standard help text was provided  in a
    separate  file  named  'gnatsweb.html'.   For  some  reason it was
    decided to allow the name of  the help file to be customized,  and
    it was possible to specify  this filename by providing a  value to
    the help_file parameter in a request URL.  If a URL such as

        http://www.whatever.whatever/cgi-bin/gnatsweb.pl?cmd=help&help_file=somefile.html

    was  used  to  access  Gnatsweb,  the  file somefile.html would be
    served up as help  text instead.  The  problem was that the  value
    of this parameter was never checked before it was used in an  OPEN
    statement.

    By  judicious  use  of  special  characters  in  the  value of the
    help_file  parameter,  an  attacker  would  be  able  to  read the
    contents  of  any  file  or  execute  any command to which the web
    server process user had access.

Solution

    Download and apply the patch  for your version of Gnatsweb.   This
    fix  hardcodes  the  name  'gnatsweb.html'  for  the help file and
    makes a slight modification to the way the file is opened.

    Gnatsweb  3.95  is   part  of  the   yet-to-be-released  GNATS   4
    distribution.   Versions  checked  out  of  the  CVS repository on
    sources.redhat.com prior  to Jun  26 2001  12:15 PDT  contain this
    bug.  Users running such versions should check out a new version.

    A new version of Gnatsweb incorporating this fix, numbered  2.8.2,
    is  available  from  the  FTP  site on sources.redhat.com and from
    ftp.gnu.org and its mirrors.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH