Closed weakbytes closed 1 year ago
Gargoyle is a single user system. You must have already broken the root password to be able to run any page that does this. If you've got root, you've got an easier attack route than this.
I get it, but I think the attack vector is kind of moot here. Do you agree? I'm happy to hear you out.
Further, haserl filters these variables into the environment. So if there's a vulnerability it likely exists at that level. I recently tested this after an issue was raised against the diagnostics plug-in
Further, haserl filters these variables into the environment. So if there's a vulnerability it likely exists at that level. I recently tested this after an issue was raised against the diagnostics plug-in
did You tried to inject both url encoded (full encoding and not full) data?
I'll run some further validations. If you have a proof of concept vulnerability that you believe works, feel free to send it to me privately via the forum or you can email me. That way any potential vulnerability is disclosed privately and can be fixed before details are released.
I'll run some further validations. If you have a proof of concept vulnerability that you believe works, feel free to send it to me privately via the forum or you can email me. That way any potential vulnerability is disclosed privately and can be fixed before details are released.
Thank You,
Gargoyle router is no longer in my possession. But this part of code catch my eyes
I was not able to produce any RCE type issues with this code.
IF a line existed like eval $(echo "$HTTP_USER_AGENT")
then yes it is very easy to trigger lots of unwanted behaviour.
However passing it into the gargoyle_session_validator appears to do no harm, and I was not able to come up with any syntax that would escape out of this subshell and execute anything meaningful.
From my point of view, this issue should now be closed, and if in the future yourself (or anyone else) is able to produce some kind of vulnerability of this nature, please do let me know! Thanks for raising the issue!
@weakbytes please close this issue
Closed
Almost all utility scripts contains following or similar:
Consider this: Let's assume: HTTP_USER_AGENT='$(ls > log.txt;sleep 30)' Then this is safe as nothing gets executed: echo $HTTP_USER_AGENT echo "$HTTP_USER_AGENT" But this is does gets executed: eval $(echo "$HTTP_USER_AGENT")
Do we have here potential RCE vulnerability using $POST_hash" "$COOKIE_exp" "$HTTP_USER_AGENT" "$COOKIE_browser_time"?