[rt-devel] security hole in RT's setuid handling

Daniel Hagerty hag at linnaean.org
Tue Aug 22 16:51:22 EDT 2000


    After having a fresh RT install print the following at me, I
investigated:

Insecure $ENV{BASH_ENV} while running setuid at /opt/rt/lib/rt/support/mail.pm line 137.



    The setuid wrapper for RT doesn't do any environment cleansing.
Hostile users can pass in LD_PRELOAD and the like to perform arbitrary
operations as the RT user.





More information about the Rt-devel mailing list