Hi, I've just discovered that gource is vulnerable to rewriting any user file:
uid_t myuid = getuid();
sprintf(logfile_buff, "/tmp/gource-%d.tmp", myuid);
temp_file = std::string(logfile_buff);
...
sprintf(cmd_buff, "%s > %s", command.c_str(), temp_file.c_str());
Attacker can create link to any user file, this one will be overwritten on next
gource run.
Thanks.
Original issue reported on code.google.com by segooon@gmail.com on 19 Jul 2010 at 4:44
Original issue reported on code.google.com by
segooon@gmail.com
on 19 Jul 2010 at 4:44