aboutsummaryrefslogtreecommitdiff
path: root/ikiwiki-update-wikilist
diff options
context:
space:
mode:
authorSimon McVittie <smcv@debian.org>2016-07-28 09:50:09 +0100
committerSimon McVittie <smcv@debian.org>2016-07-28 09:50:21 +0100
commit4729ff0812c1f3d06d98524e2fec232d3bf90513 (patch)
treefcb8ace67ba164a5463ba23b978baaf058b5f897 /ikiwiki-update-wikilist
parenta6c453606ead56312533e0d494e9aaebe6b1e57d (diff)
downloadikiwiki-4729ff0812c1f3d06d98524e2fec232d3bf90513.tar
ikiwiki-4729ff0812c1f3d06d98524e2fec232d3bf90513.tar.gz
Exclude working directory from library path (CVE-2016-1238)
Current Perl versions put '.' at the end of the library search path @INC, although this will be fixed in a future Perl release. This means that when software loads an optionally-present module, it will be looked for in the current working directory before giving up. An attacker could use this to execute arbitrary Perl code from ikiwiki's current working directory. Removing '.' from the library search path in Perl is the correct fix for this vulnerability, but is not trivial to do due to backwards-compatibility concerns. Mitigate this (even if ikiwiki is run with a vulnerable Perl version) by explicitly removing '.' from the search path, and instead looking for ikiwiki's own modules relative to the absolute path of the executable when run from the source directory. In tests that specifically want to use the current working directory, use "-I".getcwd instead of "-I." so we use its absolute path, which is immune to the removal of ".".
Diffstat (limited to 'ikiwiki-update-wikilist')
-rwxr-xr-xikiwiki-update-wikilist1
1 files changed, 1 insertions, 0 deletions
diff --git a/ikiwiki-update-wikilist b/ikiwiki-update-wikilist
index 56d6e0731..2807e6be6 100755
--- a/ikiwiki-update-wikilist
+++ b/ikiwiki-update-wikilist
@@ -1,6 +1,7 @@
#!/usr/bin/perl -t
# Add a user to the system wide wikilist.
# This script can safely be made suid or put in /etc/sudoers.
+no lib '.';
use warnings;
use strict;
use English;