GLSA Bodhisattva
Joined: 13 Jun 2003 Posts: 4087 Location: Dresden, Germany
|
Posted: Fri Sep 03, 2004 8:01 pm Post subject: [ GLSA 200409-08 ] Ruby: CGI::Session creates files insecure |
|
|
Gentoo Linux Security Advisory
Title: Ruby: CGI::Session creates files insecurely (GLSA 200409-08)
Severity: normal
Exploitable: local
Date: September 03, 2004
Bug(s): #60525
ID: 200409-08
Synopsis
When used for CGI scripting, Ruby creates session files in /tmp with the permissions of the default umask. Depending on that umask, local users may be able to read sensitive data stored in session files.
Background
Ruby is an Object Oriented, interpreted scripting language used for many system scripting tasks. It can also be used for CGI web applications.
Affected Packages
Package: dev-lang/ruby
Vulnerable: < 1.8.2_pre2
Unaffected: >= 1.6.8-r11 < 1.6.9
Unaffected: >= 1.8.0-r7 < 1.8.1
Unaffected: >= 1.8.2_pre2
Architectures: All supported architectures
Description
The CGI::Session::FileStore implementation (and presumably CGI::Session::PStore), which allow data associated with a particular Session instance to be written to a file, writes to a file in /tmp with no regard for secure permissions. As a result, the file is left with whatever the default umask permissions are, which commonly would allow other local users to read the data from that session file.
Impact
Depending on the default umask, any data stored using these methods could be read by other users on the system.
Workaround
By changing the default umask on the system to not permit read access to other users (e.g. 0700), one can prevent these files from being readable by other users.
Resolution
All Ruby users should upgrade to the latest version: Code: | # emerge sync
# emerge -pv ">=dev-lang/ruby-your_version"
# emerge ">=dev-lang/ruby-your_version" |
References
CAN-2004-0755
Last edited by GLSA on Sun May 07, 2006 4:52 pm; edited 1 time in total |
|