A vulnerability has been discovered in Sympa web interface
by which attacker can execute arbitrary code with root privileges.
Sympa uses two sorts of setuid wrappers:
FastCGI wrappers
newaliases wrapper
The FastCGI wrappers wwsympa-wrapper.fcgi and
sympa_soap_server-wrapper.fcgi were used to make the web
interface running under privileges of a dedicated user.
The newaliases wrapper (sympa_newaliases-wrapper) allows
Sympa to update the alias database with root privileges.
Since these setuid wrappers did not clear environment variables,
if environment variables like PERL5LIB were injected,
forged code might be loaded and executed under privileges of setuid-ed
users.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center