TUCoPS :: Web BBS :: etc :: discus1.htm

Discus inappropriate permissions
Vulnerability

    Discus

Affected

    Systems running Discus (Free discussion for your Web Site!)

Description

    Elaich Of Hhp  found following.   Discus has a  directory and file
    permission problem.   The code  is really  messy and  they need to
    learn  file  and   permission  operations  better.    The   source
    determines  the  mode  of  the  directories  and  files from other
    sources: Line: 533  in discus3_01/source/src-board-setup which  is
    a totally bad  idea being that  no matter what,  the private files
    should not be +r... ie, the  *.txt's  and so on.

Solution

    If  this  is  running  under  Linux,  FreeBSD or any system with a
    decent  shadow  password  system   or  something  similar  AND   a
    sanely-configured  web  server,  e.g.  with  CGIwrap, any internal
    wrappering which runs scripts as the owner of the script like  any
    later version of Apache with the integrated setuid wrapper, or  at
    the  very  least  just  outright  running  scripts as an arbitrary
    unprivileged  user,  there   is  no  problem.    You  can't   read
    /etc/shadow|/etc/master.passwd|/etc/whatever  if   you're  not   a
    privileged user.  Anyway, the software creates the directory  with
    666 perms.  In that directory there is a users.txt and a admin.txt
    which both contain  crypt(3) passwds.   The admin directory  where
    these files are found is mentioned in the documentation.  They  do
    tell you to make sure the directory is not web readable.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH