Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-61BC44CE-9F5A-11EA-AFF3-F8B156C2BFE9: sympa - Security flaws in setuid wrappers

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

FreeBSD: VID-61BC44CE-9F5A-11EA-AFF3-F8B156C2BFE9: sympa - Security flaws in setuid wrappers

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/24/2020
Created
05/30/2020
Added
05/28/2020
Modified
05/28/2020

Description

A vulnerability has been discovered in Sympa web interface

by which attacker can execute arbitrary code with root privileges.

Sympa uses two sorts of setuid wrappers:

FastCGI wrappers

newaliases wrapper

The FastCGI wrappers wwsympa-wrapper.fcgi and

sympa_soap_server-wrapper.fcgi were used to make the web

interface running under privileges of a dedicated user.

The newaliases wrapper (sympa_newaliases-wrapper) allows

Sympa to update the alias database with root privileges.

Since these setuid wrappers did not clear environment variables,

if environment variables like PERL5LIB were injected,

forged code might be loaded and executed under privileges of setuid-ed

users.

Solution(s)

  • freebsd-upgrade-package-sympa

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;