Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Explain the security issue? #75

Closed
jcrben opened this issue Apr 28, 2017 · 2 comments
Closed

Explain the security issue? #75

jcrben opened this issue Apr 28, 2017 · 2 comments

Comments

@jcrben
Copy link

jcrben commented Apr 28, 2017

It seems that the dropbox link which disclosed the security vulnerability is a dead link. Would you mind explaining it so that other developers can learn from it?

@BBBSnowball
Copy link

The dropbox link doesn't explain the vulnerability. It is only an "icon". See http://web.archive.org/web/20160304140911/https://dl.dropboxusercontent.com/u/402325/dontdelete/magpie.jpg

I have never seen the demo while it was still live and I can only guess what the vulnerability might be. I hope this helps anyway.

The author says that users were able to see the whole filesystem (see #73 (comment)). I think this is related to the setting for the repository path. The setting is available via the web interface so an attacker is able to view any git repository (if permissions for the magpie user allow that). I have never tried setting this to a non-git directory but that may yield interesting results. I'm not sure whether this functionality was disabled in the demo.

If magpie is running from a clone of this repository and the magpie user can write to that directory, you have remote code execution (if you can guess or find out the path to the repo).

In addition, the code that handles settings doesn't handle special characters. This is not required for normal operation. However, I think this may also allow remote code execution.

I'm using magpie with external access controls (in a VPN) and I trust all the users (only me) so I'm not too woried about the vulnerability. Nonetheless, I would also like to know whether charlesthomas knows any additional vulnerabilities. They are probably not too hard to fix once we know where to look.

@jcrben
Copy link
Author

jcrben commented Nov 19, 2017

thanks! closing this for now as that satisfies my curiosity

@jcrben jcrben closed this as completed Nov 19, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants