[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100403060929.GA2347@truecrux.org>
Date: Sat, 3 Apr 2010 10:09:29 +0400
From: Vladimir Lettiev <thecrux@...il.com>
To: bugs lists <bugs@....dhs.org>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: FileCache: tmp file permission vulnerability.
On Thu, Apr 01, 2010 at 11:30:50PM -0400, bugs lists wrote:
>
>
> FileCache: tmp file permission vulnerability.
> Larry W. Cashdollar
> Vapid Labs http://vapid.dhs.org
> 2/16/2010
>
> Perl Cache-Cache-1.06 is a memory and file caching module for perl. It
> stores its default file cache in /tmp with world read/write permissions. A
> local attacker can use this cache to glean information from applications
> using module. Regardless of weather the transaction is taking place over an
> encrypted SSL session.
This is documented behaviour. You can override insecure default cache root and
umask with options 'cache_root' and 'directory_umask':
use Cache::FileCache;
use File::Temp qw/ tempdir /;
my $cache = new Cache::FileCache( {
'cache_root' => tempdir('CacheXXXXX'),
'directory_umask' => 077,
} );
--
Vladimir Lettiev aka crux <theCrux@...il.com>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists