Skip to content

Latest commit

 

History

History
130 lines (78 loc) · 3.77 KB

2020-002.md

File metadata and controls

130 lines (78 loc) · 3.77 KB

2020-002 Security flaws in setuid wrappers

The Sympa Community 2020-05-27 (Update)

Synopsis

A fix is available for a vulnerability discovered in Sympa web interface.

Systems Affected

  • All versions of Sympa prior to 6.2.56

Problem Description

A vulnerability has been discovered in Sympa web interface by which attacker can execute arbitrary code with root privileges.

Sympa uses two sorts of setuid wrappers:

  • FastCGI wrappers
  • newaliases wrapper

The FastCGI wrappers (wwsympa-wrapper.fcgi and sympa_soap_server-wrapper.fcgi) were used to make the web interface running under privileges of a dedicated user.

The newaliases wrapper (sympa_newaliases-wrapper) allows Sympa to update the alias database with root privileges.

Since these setuid wrappers did not clear environment variables, if environment variables like PERL5LIB were injected, forged code might be loaded and executed under privileges of setuid-ed users.

For more details see References.

Impact

Attacker can execute arbitrary code with root privileges.

Workarounds

Solution

  • Upgrade to version 6.2.56

    • Source distribution: sympa-6.2.56.tar.gz
    • Binary distributions: Check release information by distributors.

or, if you have installed Sympa using earlier version of source distribution,

CVE Numbers

CVE-2020-10936

References

Acknowledgements

The security flaw this advisory describes was reported by Nicolas Chatelain, Sysdream Labs.

Change log

  • 2020-05-24

    Initial version published.

  • 2020-05-27

    CVE Numbers: Confirmed that CVE-2020-10936 has been assigned.

    References: Adding report by Nicolas.

    Solution: Adding patch for Sympa 6.1.25