Page 1 of 1

Re: [Nagios-devel] nrpe, arguments and security

Posted: Tue Nov 30, 2004 8:28 am
by Guest
Peter Åstrand wrote:
> On Tue, 30 Nov 2004, Andreas Ericsson wrote:
>
>
>>>+#define ALLOWED_ARGUMENT_CHARS " !abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
>>>
>>
>>! is not currently in the safe-by-default list, as it is treated
>>different depending on where your /bin/sh points to. ,.% are, though.
>
>
> But ! will never reach the shell, since it's just the internal argument
> separator.
>
>

Each argument is parsed individually.

Theoretically one could get by simply by adding single quotes around the
argument and escaping all single quotes within it.
echo 'arg; cat /etc/passwd' is perfectly safe with all shells I'm aware of.

>
>>I've already implemented whitelist argument chars in current NRPE (which
>>isn't publicly available, since I haven't gotten the PK authentication
>>to work properly). Thanks for participating though.
>
>
> It would be great if this issue could be resolved as soon as possible. Is
> it possible that you can add your "whitelist" implementation separated
> from the PK stuff?
>

Possibly, but code is in flux right now so in that case it'll be a
little while before I get things straightened out.

--
Andreas Ericsson [email protected]
OP5 AB www.op5.se
Lead Developer





This post was automatically imported from historical nagios-devel mailing list archives
Original poster: [email protected]