diff options
| author | Steve Kemp <steve@steve.org.uk> | 2012-11-18 12:10:05 +0000 | 
|---|---|---|
| committer | Steve Kemp <steve@steve.org.uk> | 2012-11-18 12:10:05 +0000 | 
| commit | 55fcf4f783f170e6a1cc8ab7ec173b274be3199d (patch) | |
| tree | 016ab7fbe4e7e4f091d770c03c622e8ae58ab541 /SECURITY | |
| parent | 83bef1ad6bb484623363f629990f0258177efcb8 (diff) | |
  Added.  TODO: Expand/Imporove
Diffstat (limited to 'SECURITY')
| -rw-r--r-- | SECURITY | 61 | 
1 files changed, 61 insertions, 0 deletions
| diff --git a/SECURITY b/SECURITY new file mode 100644 index 0000000..f3e39b0 --- /dev/null +++ b/SECURITY @@ -0,0 +1,61 @@ + + + +custodian-enqueue +----------------- + +  We open named files from the user to parse tests. + +  We don't run shell commands. + + +custodian-dequeue +----------------- + +  Two tests pass arguments from the configuration file to + the shell: + +    ping + +    http/https + +  The hostname used to ping, and the url, are both passed + directly to the shell with no encoding or sanitizing. + +  This means a test such as the following is a risk: + + $(touch /tmp/blah) must run ping. + +  HOWEVER the hostname will pass the following regexp: + +^([^\s]+)\s+ + +  So in real terms the only risk is commands without + spaces: + + +  $(/tmp/exploit.sh) must run ping + + +  TODO: Fix this + + + +general +------- + +  We decode arbitrary JSON from the queue.  We should sign + it, or validate it.  This will prevent trojan malformed + JSON from being added. + + + +TODO +---- + +  Anything else?  DoS attacks? + + + +Steve +-- 
\ No newline at end of file | 
