bug-wget
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Bug-wget] security risk of unexpected download filenames


From: Giuseppe Scrivano
Subject: Re: [Bug-wget] security risk of unexpected download filenames
Date: Wed, 28 Jul 2010 21:40:10 +0200
User-agent: Gnus/5.13 (Gnus v5.13) Emacs/23.1 (gnu/linux)

I have pushed a patch to fix it with the commit 2409, it introduces a
new option --trust-server-names.

Cheers,
Giuseppe



Solar Designer <address@hidden> writes:

> Giuseppe, Micah, all -
>
> As I hope you're aware, oCERT has published an advisory on a security
> issue with lftp, wget, and libwww-perl.  lftp and libwww-perl have fixed
> the issue.  wget didn't.
>
> http://www.ocert.org/advisories/ocert-2010-001.html
>
> Here's a demonstration of an attack on what I think is a typical wget
> cron job:
>
> http://www.openwall.com/lists/oss-security/2010/05/18/13
>
> The attack provides a .wgetrc, which enables a second invocation of the
> cron job to overwrite a file such as .bash_profile.  This is just one
> example.  Please do not "fix" this by treating ".wgetrc" specially.
>
> Here's an unofficial patch for the issue:
>
> http://www.openwall.com/lists/oss-security/2010/05/17/2
>
> Now that we have a proof-of-concept real-world attack scenario and we
> readily have a patch, would you possibly consider fixing this upstream?
>
> Thanks,
>
> Alexander


=== modified file 'NEWS'
--- NEWS        2010-07-11 13:47:18 +0000
+++ NEWS        2010-07-28 19:22:13 +0000
@@ -33,6 +33,9 @@
 ** GNU TLS backend works again.
 
 ** Now --timestamping and --continue works well together.
+
+** By default, on server redirects, use the original URL to get the
+   local file name. Close CVE-2010-2252.
 
 * Changes in Wget 1.12
 

=== modified file 'doc/wget.texi'
--- doc/wget.texi       2010-05-27 10:45:15 +0000
+++ doc/wget.texi       2010-07-28 19:13:05 +0000
@@ -1498,6 +1498,13 @@
 @code{Content-Disposition} headers to describe what the name of a
 downloaded file should be.
 
address@hidden Trust server names
address@hidden --trust-server-names
+
+If this is set to on, on a redirect the last component of the
+redirection URL will be used as the local file name.  By default it is
+used the last component in the original URL.
+
 @cindex authentication
 @item --auth-no-challenge
 
@@ -2810,6 +2817,10 @@
 Turn on recognition of the (non-standard) @samp{Content-Disposition}
 HTTP header---if set to @samp{on}, the same as @samp{--content-disposition}.
 
address@hidden trust_server_names = on/off
+If set to on, use the last component of a redirection URL for the local
+file name.
+
 @item continue = on/off
 If set to on, force continuation of preexistent partially retrieved
 files.  See @samp{-c} before setting it.

=== modified file 'src/ChangeLog'
--- src/ChangeLog       2010-07-20 17:42:13 +0000
+++ src/ChangeLog       2010-07-28 18:44:11 +0000
@@ -1,3 +1,18 @@
+2010-07-28  Giuseppe Scrivano  <address@hidden>
+
+       * http.h (http_loop): Add new argument `original_url'
+       * http.c (http_loop): Add new argument `original_url'.  Use
+       `original_url' to get a filename if `trustservernames' is false.
+
+       * init.c (commands): Add "trustservernames".
+
+       * options.h (library): Add variable `trustservernames'.
+
+       * main.c (option_data): Add trust-server-names.
+       (print_help): Describe --trust-server-names.
+
+       * retr.c (retrieve_url): Pass new argument to `http_loop'.
+
 2010-07-20  Alan Jenkins <address@hidden> (tiny change)
 
        * http.c (gethttp): Check content-length was set before trying to

=== modified file 'src/http.c'
--- src/http.c  2010-07-20 17:42:13 +0000
+++ src/http.c  2010-07-28 18:35:21 +0000
@@ -2593,8 +2593,9 @@
 /* The genuine HTTP loop!  This is the part where the retrieval is
    retried, and retried, and retried, and...  */
 uerr_t
-http_loop (struct url *u, char **newloc, char **local_file, const char 
*referer,
-           int *dt, struct url *proxy, struct iri *iri)
+http_loop (struct url *u, struct url *original_url, char **newloc,
+           char **local_file, const char *referer, int *dt, struct url *proxy,
+           struct iri *iri)
 {
   int count;
   bool got_head = false;         /* used for time-stamping and filename 
detection */
@@ -2641,7 +2642,8 @@
     }
   else if (!opt.content_disposition)
     {
-      hstat.local_file = url_file_name (u);
+      hstat.local_file =
+        url_file_name (opt.trustservernames ? u : original_url);
       got_name = true;
     }
 
@@ -2679,7 +2681,7 @@
 
   /* Send preliminary HEAD request if -N is given and we have an existing
    * destination file. */
-  file_name = url_file_name (u);
+  file_name = url_file_name (opt.trustservernames ? u : original_url);
   if (opt.timestamping && (file_exists_p (file_name)
                            || opt.content_disposition))
     send_head_first = true;
@@ -3039,9 +3041,9 @@
 
           /* Remember that we downloaded the file for later ".orig" code. */
           if (*dt & ADDED_HTML_EXTENSION)
-            downloaded_file(FILE_DOWNLOADED_AND_HTML_EXTENSION_ADDED, 
hstat.local_file);
+            downloaded_file (FILE_DOWNLOADED_AND_HTML_EXTENSION_ADDED, 
hstat.local_file);
           else
-            downloaded_file(FILE_DOWNLOADED_NORMALLY, hstat.local_file);
+            downloaded_file (FILE_DOWNLOADED_NORMALLY, hstat.local_file);
 
           ret = RETROK;
           goto exit;
@@ -3072,9 +3074,9 @@
 
               /* Remember that we downloaded the file for later ".orig" code. 
*/
               if (*dt & ADDED_HTML_EXTENSION)
-                downloaded_file(FILE_DOWNLOADED_AND_HTML_EXTENSION_ADDED, 
hstat.local_file);
+                downloaded_file (FILE_DOWNLOADED_AND_HTML_EXTENSION_ADDED, 
hstat.local_file);
               else
-                downloaded_file(FILE_DOWNLOADED_NORMALLY, hstat.local_file);
+                downloaded_file (FILE_DOWNLOADED_NORMALLY, hstat.local_file);
 
               ret = RETROK;
               goto exit;

=== modified file 'src/http.h'
--- src/http.h  2010-05-08 19:56:15 +0000
+++ src/http.h  2010-07-28 18:11:35 +0000
@@ -33,8 +33,8 @@
 
 struct url;
 
-uerr_t http_loop (struct url *, char **, char **, const char *, int *,
-                 struct url *, struct iri *);
+uerr_t http_loop (struct url *, struct url *, char **, char **, const char *,
+                  int *, struct url *, struct iri *);
 void save_cookies (void);
 void http_cleanup (void);
 time_t http_atotm (const char *);

=== modified file 'src/init.c'
--- src/init.c  2010-05-08 19:56:15 +0000
+++ src/init.c  2010-07-28 18:25:22 +0000
@@ -252,6 +252,7 @@
   { "timeout",          NULL,                   cmd_spec_timeout },
   { "timestamping",     &opt.timestamping,      cmd_boolean },
   { "tries",            &opt.ntry,              cmd_number_inf },
+  { "trustservernames", &opt.trustservernames,  cmd_boolean },
   { "useproxy",         &opt.use_proxy,         cmd_boolean },
   { "user",             &opt.user,              cmd_string },
   { "useragent",        NULL,                   cmd_spec_useragent },

=== modified file 'src/main.c'
--- src/main.c  2010-06-20 10:10:35 +0000
+++ src/main.c  2010-07-28 19:02:25 +0000
@@ -266,6 +266,7 @@
     { "timeout", 'T', OPT_VALUE, "timeout", -1 },
     { "timestamping", 'N', OPT_BOOLEAN, "timestamping", -1 },
     { "tries", 't', OPT_VALUE, "tries", -1 },
+    { "trust-server-names", 0, OPT_BOOLEAN, "trustservernames", -1 },
     { "use-server-timestamps", 0, OPT_BOOLEAN, "useservertimestamps", -1 },
     { "user", 0, OPT_VALUE, "user", -1 },
     { "user-agent", 'U', OPT_VALUE, "useragent", -1 },
@@ -680,6 +681,8 @@
     N_("\
   -I,  --include-directories=LIST  list of allowed directories.\n"),
     N_("\
+  --trust-server-names  use the name specified by the redirection url last 
component.\n"),
+    N_("\
   -X,  --exclude-directories=LIST  list of excluded directories.\n"),
     N_("\
   -np, --no-parent                 don't ascend to the parent directory.\n"),

=== modified file 'src/options.h'
--- src/options.h       2010-05-08 19:56:15 +0000
+++ src/options.h       2010-07-28 18:24:09 +0000
@@ -242,6 +242,7 @@
   char *encoding_remote;
   char *locale;
 
+  bool trustservernames;
 #ifdef __VMS
   int ftp_stmlf;                /* Force Stream_LF format for binary FTP. */
 #endif /* def __VMS */

=== modified file 'src/retr.c'
--- src/retr.c  2010-05-08 19:56:15 +0000
+++ src/retr.c  2010-07-28 18:43:27 +0000
@@ -731,7 +731,8 @@
 #endif
       || (proxy_url && proxy_url->scheme == SCHEME_HTTP))
     {
-      result = http_loop (u, &mynewloc, &local_file, refurl, dt, proxy_url, 
iri);
+      result = http_loop (u, orig_parsed, &mynewloc, &local_file, refurl, dt,
+                          proxy_url, iri);
     }
   else if (u->scheme == SCHEME_FTP)
     {



reply via email to

[Prev in Thread] Current Thread [Next in Thread]