[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Environment variable of a name which is often used
From: |
Norihiro Tanaka |
Subject: |
Environment variable of a name which is often used |
Date: |
Sat, 27 Sep 2014 02:31:59 +0900 |
I tried 4.3.25 in order to check the details of CVE-2014-6271, and
confirmed that the bug is fixed with a test case.
Next, I tried following case, and receive an output `rm -rf /'. I seem
that is designed, but it's also vulnerable.
$ cat <<EOF >test.sh
#!/bin/bash
cat /dev/null
EOF
$ chmod a+x test.sh
$ env cat='() { echo rm -rf /; }' ./test.sh
`cat' command is often used. If we set write malicious code to
environment variable named `cat', I see that it's often run, even if not
expected.
Thanks,
Norihiro
- Environment variable of a name which is often used,
Norihiro Tanaka <=