Open geeknik opened 3 years ago
HackerOne triage said this bug was out of scope because it requires "physical i can touch your server" access in order to exploit.
It does require "physical i can touch your server" access to create config files. Having the attacker be able to create/modify files owned by your application in their location of choice causes many, many other issues
https://en.cppreference.com/w/c/experimental/dynamic/strndup is used in string_copy, in config parsing code. It should be using something other than nc_strncmp and returning an NC_ERROR
rstatus_t
if there's a null byte before srclen, there's not a good reason right now to support null bytes in config file entries
HackerOne triage said this bug was out of scope because it requires "physical i can touch your server" access in order to exploit. I believe they are wrong in their assessment, however, there is no point trying to change their mind and this issue probably needs to be fixed, so here I am.
Describe the bug We discovered a heap-buffer-overflow in this chunk of code (
twemproxy/src/nc_string.c:96
):To Reproduce
./nutcracker -c poc.yml
poc.yml
Expected behavior No crash.
Actual behavior
Screenshots
Environment Clang 12, Ubuntu 18 or 21
Additional context HackerOne triage gatekeeping bugs they don't understand is silly and needs to stop.