且构网

分享程序员开发的那些事...
且构网 - 分享程序员编程开发的那些事

svn security bugs

更新时间:2022-09-08 20:18:36

http://subversion.apache.org/security/CVE-2013-2088-advisory.txt

   Subversion releases up to 1.6.22 (inclusive), and 1.7.x tags up to 1.7.10
   (inclusive, but excepting 1.7.x releases made from those tags), 
   include a contrib/ script prone to shell injection by authenticated users,
   which could result in arbitrary code execution.

Summary:
========

Subversion's contrib/ directory contains two example hook scripts, which
use 'svnlook changed' to examine a revision or transaction and then pass
those paths as arguments to further 'svnlook' commands, without properly
escaping the command-line.

The contrib/ directory ships in 1.6.x releases, and although it does not
ship in 1.7.x or 1.8.x releases, is included in the 1.7.x and 1.8.x
release branches and tags in Subversion's repository.

Known vulnerable:
=================

  Subversion releases through 1.6.22 (inculsive)
  Repository revisions branches/1.7.x until r1485487
  Repository revisions branches/1.8.x until r1485487
  Subversion tags through 1.7.10 (inclusive)

Known fixed:
============

  Releases:
  Subversion 1.6.23
  Subversion 1.7.0
  Subversion 1.8.0

  Tags:
  Subversion 1.6.23
  Subversion 1.7.11
  Subversion 1.8.0-rc3
  Subversion 1.8.0

Details:
========

  The script contrib/hook-scripts/check-mime-type.pl does not escape
  argv arguments to 'svnlook' that start with a hyphen.  This could be
  used to cause 'svnlook', and hence check-mime-type.pl, to error out.

  The script contrib/hook-scripts/svn-keyword-check.pl parses filenames
  from the output of 'svnlook changed' and passes them to a further
  shell command (equivalent to the 'system()' call of the C standard
  library) without escaping them.  This could be used to run arbitrary
  shell commands in the context of the user whom the pre-commit script
  runs as (the user who owns the repository).

Severity:
=========

  CVSSv2 Base Score: 7.1
  CVSSv2 Base Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C  

  Most installations of Subversion do not use these contrib scripts, so
  while the score above is high, we suspect that very few sites are impacted.
  However, if you do use these scripts, this is a serious issue.

  The check-mime-type.pl issue could only be a problem if 'svnlook' was
  patched or if a child of the repository root had a name starting with
  a '-', so it is ranked as low severity.

  The svn-keyword-check.pl issue could be used by any authenticated
  committer to run shell commands as the server.  Anonymous users
  typically do not have commit access so cannot exploit this.  On the
  other hand, those who can exploit this could, for example, delete
  the repository from the server disk.

Recommendations:
================

  We recommend all users to apply the attached patch.  The hook scripts
  have not changed since 1.6.x, so using their latest versions from the
  repository is (as of this writing) equivalent to applying the patch.

  The fix will be included in the 1.6.23, 1.7.11, and 1.8.0 releases,
  when those are made.

  A workaround is to ensure that all in-repository filenames are shell-safe,
  e.g., match the regular expression
      ^[A-Za-z0-9_:][A-Za-z0-9_:/-]+$
  .  This can be implemented using the provided [validate-files.py] hook
  script, by providing a command= that checks the environment variable "FILE"
  against that pattern; for example, command= might point to the following
  script:

      #!/usr/bin/env python
      import os, re, sys
      re = r'^[A-Za-z0-9_:][A-Za-z0-9_:/-]+$'
      sys.exit(re.compile(re).match(os.getenv("FILE", " ")))

References:
===========

  CVE-2013-2088  (Subversion)

Reported by:
============

Daniel Shahaf, elego Software Solutions GmbH

Patches:
========

  Patch against 1.6.21, 1.7.x branch/tags, and 1.8.x branch:
[[[
Index: contrib/hook-scripts/check-mime-type.pl
===================================================================
--- contrib/hook-scripts/check-mime-type.pl	(revision 1484585)
+++ contrib/hook-scripts/check-mime-type.pl	(working copy)
@@ -120,7 +120,7 @@ foreach my $path ( @files_added )
 		# Parse the complete list of property values of the file $path to extract
 		# the mime-type and eol-style
 		foreach my $prop (&read_from_process($svnlook, 'proplist', $repos, '-t',
-		                  $txn, '--verbose', $path))
+		                  $txn, '--verbose', '--', $path))
 			{
 				if ($prop =~ /^\s*svn:mime-type : (\S+)/)
 					{
@@ -187,7 +187,7 @@ sub safe_read_from_pipe
       croak "$0: safe_read_from_pipe passed no arguments.\n";
     }
   print "Running @_\n";
-  my $pid = open(SAFE_READ, '-|');
+  my $pid = open(SAFE_READ, '-|', @_);
   unless (defined $pid)
     {
       die "$0: cannot fork: $!\n";
Index: contrib/hook-scripts/svn-keyword-check.pl
===================================================================
--- contrib/hook-scripts/svn-keyword-check.pl	(revision 1484585)
+++ contrib/hook-scripts/svn-keyword-check.pl	(working copy)
@@ -141,7 +141,7 @@ sub check {
                 return 1;
             } else {
                 my @keywords = get_svnkeywords($file);
-                my $fh = _pipe("$svnlook cat $flag $value $repos $file");
+                my $fh = _pipe($svnlook, qw/cat/, $flag, $value, $repos, '--', $file);
                 while (my $line = <$fh>) {
                     foreach my $keyword (@keywords) {
                         if ($line =~ m/$keyword/) {
@@ -168,7 +168,7 @@ sub file_is_binary {
         return 0;
     }
     if (has_svn_property($file, "svn:mime-type")) {
-        my ($mimetype) = read_from_process("$svnlook propget $flag $value $repos svn:mime-type $file");
+        my ($mimetype) = read_from_process($svnlook, qw/propget/, $flag, $value, $repos, 'svn:mime-type', '--', $file);
         chomp($mimetype);
         $mimetype =~ s/^\s*(.*)/$1/;
         if ($mimetype =~ m/^text\//) {
@@ -186,7 +186,7 @@ sub file_is_binary {
 # Return a list of svn:keywords on a file
 sub get_svnkeywords {
     my $file = shift;
-    my @lines = read_from_process("$svnlook propget $flag $value $repos svn:keywords $file");
+    my @lines = read_from_process($svnlook, qw/propget/, $flag, $value, $repos, 'svn:keywords', '--', $file);
     my @returnlines;
     foreach my $line (@lines) {
         $line =~ s/\s+/ /;
@@ -199,7 +199,7 @@ sub get_svnkeywords {
 sub has_svn_property {
     my $file = shift;
     my $keyword = shift;
-    my @proplist = read_from_process("$svnlook proplist $flag $value $repos $file");
+    my @proplist = read_from_process($svnlook, qw/proplist/, $flag, $value, $repos, '--', $file);
     foreach my $prop (@proplist) {
         chomp($prop);
         if ($prop =~ m/\b$keyword\b/) {
@@ -241,7 +241,7 @@ sub safe_read_from_pipe {
 # Return the filehandle as a glob so we can loop over it elsewhere.
 sub _pipe {
     local *SAFE_READ;
-    my $pid = open(SAFE_READ, '-|');
+    my $pid = open(SAFE_READ, '-|', @_);
     unless (defined $pid) {
         die "$0: cannot fork: $!\n";
     }
]]]