diff options
author | Max Kanat-Alexander <mkanat@bugzilla.org> | 2010-02-01 13:22:56 -0800 |
---|---|---|
committer | Max Kanat-Alexander <mkanat@bugzilla.org> | 2010-02-01 13:22:56 -0800 |
commit | 532196b8689286cf4e65b58c98afa95ca910d7ac (patch) | |
tree | 98bd0899ef01aa911f3b634443e8b82258422609 | |
parent | 6d11d68f570d4d921f078a67ce1928703df4bf2e (diff) | |
download | bugs-532196b8689286cf4e65b58c98afa95ca910d7ac.tar bugs-532196b8689286cf4e65b58c98afa95ca910d7ac.tar.gz bugs-532196b8689286cf4e65b58c98afa95ca910d7ac.tar.bz2 bugs-532196b8689286cf4e65b58c98afa95ca910d7ac.tar.xz bugs-532196b8689286cf4e65b58c98afa95ca910d7ac.zip |
Bug 314871: (CVE-2009-3989) [SECURITY] Prevent web browsers from accessing CVS/, contrib/, docs/, and t/ directories
iatch by Max Kanat-Alexander <mkanat@bugzilla.org> r=LpSolit, a=LpSolit
-rw-r--r-- | Bugzilla/Install/Filesystem.pm | 79 | ||||
-rw-r--r-- | contrib/.cvsignore | 1 | ||||
-rw-r--r-- | t/.cvsignore | 1 |
3 files changed, 52 insertions, 29 deletions
diff --git a/Bugzilla/Install/Filesystem.pm b/Bugzilla/Install/Filesystem.pm index c95b2eecb..99f71d989 100644 --- a/Bugzilla/Install/Filesystem.pm +++ b/Bugzilla/Install/Filesystem.pm @@ -48,6 +48,12 @@ our @EXPORT = qw( fix_file_permissions ); +use constant HT_DEFAULT_DENY => <<EOT; +# nothing in this directory is retrievable unless overridden by an .htaccess +# in a subdirectory +deny from all +EOT + # This looks like a constant because it effectively is, but # it has to call other subroutines and read the current filesystem, # so it's defined as a sub. This is not exported, so it doesn't have @@ -125,7 +131,9 @@ sub FILESYSTEM { "$localconfig.old" => { perms => $owner_readable }, - 'docs/makedocs.pl' => { perms => $owner_executable }, + 'contrib/README' => { perms => $owner_readable }, + 'contrib/*/README' => { perms => $owner_readable }, + 'docs/makedocs.pl' => { perms => $owner_executable }, 'docs/style.css' => { perms => $ws_readable }, 'docs/*/rel_notes.txt' => { perms => $ws_readable }, 'docs/*/README.docs' => { perms => $owner_readable }, @@ -190,6 +198,8 @@ sub FILESYSTEM { dirs => $owner_dir_readable }, 'docs/*/xml' => { files => $owner_readable, dirs => $owner_dir_readable }, + 'contrib' => { files => $owner_executable, + dirs => $owner_dir_readable, }, ); # --- FILES TO CREATE --- # @@ -256,21 +266,19 @@ EOT # Because checksetup controls the .htaccess creation separately # by a localconfig variable, these go in a separate variable from # %create_files. - my $ht_default_deny = <<EOT; -# nothing in this directory is retrievable unless overridden by an .htaccess -# in a subdirectory -deny from all -EOT - my %htaccess = ( "$attachdir/.htaccess" => { perms => $ws_readable, - contents => $ht_default_deny }, + contents => HT_DEFAULT_DENY }, "$libdir/Bugzilla/.htaccess" => { perms => $ws_readable, - contents => $ht_default_deny }, + contents => HT_DEFAULT_DENY }, "$extlib/.htaccess" => { perms => $ws_readable, - contents => $ht_default_deny }, + contents => HT_DEFAULT_DENY }, "$templatedir/.htaccess" => { perms => $ws_readable, - contents => $ht_default_deny }, + contents => HT_DEFAULT_DENY }, + 'contrib/.htaccess' => { perms => $ws_readable, + contents => HT_DEFAULT_DENY }, + 't/.htaccess' => { perms => $ws_readable, + contents => HT_DEFAULT_DENY }, '.htaccess' => { perms => $ws_readable, contents => <<EOT # Don't allow people to retrieve non-cgi executable files or our private data @@ -592,22 +600,13 @@ sub fix_all_file_permissions { _fix_perms($dir, $owner_id, $group_id, $dirs{$dir}); } - foreach my $dir (sort keys %recurse_dirs) { - next unless -d $dir; - # Set permissions on the directory itself. - my $perms = $recurse_dirs{$dir}; - _fix_perms($dir, $owner_id, $group_id, $perms->{dirs}); - # Now recurse through the directory and set the correct permissions - # on subdirectories and files. - find({ no_chdir => 1, wanted => sub { - my $name = $File::Find::name; - if (-d $name) { - _fix_perms($name, $owner_id, $group_id, $perms->{dirs}); - } - else { - _fix_perms($name, $owner_id, $group_id, $perms->{files}); - } - }}, $dir); + foreach my $pattern (sort keys %recurse_dirs) { + my $perms = $recurse_dirs{$pattern}; + # %recurse_dirs supports globs + foreach my $dir (glob $pattern) { + next unless -d $dir; + _fix_perms_recursively($dir, $owner_id, $group_id, $perms); + } } foreach my $file (sort keys %files) { @@ -640,8 +639,13 @@ sub _fix_cvs_dirs { find({ no_chdir => 1, wanted => sub { my $name = $File::Find::name; if ($File::Find::dir =~ /\/CVS/ || $_ eq '.cvsignore' - || (-d $name && $_ eq 'CVS')) { - _fix_perms($name, $owner_id, $owner_gid, 0700); + || (-d $name && $_ =~ /CVS$/)) + { + my $perms = 0600; + if (-d $name) { + $perms = 0700; + } + _fix_perms($name, $owner_id, $owner_gid, $perms); } }}, $dir); } @@ -661,6 +665,23 @@ sub _fix_perms { error => $! }) . "\n"; } +sub _fix_perms_recursively { + my ($dir, $owner_id, $group_id, $perms) = @_; + # Set permissions on the directory itself. + _fix_perms($dir, $owner_id, $group_id, $perms->{dirs}); + # Now recurse through the directory and set the correct permissions + # on subdirectories and files. + find({ no_chdir => 1, wanted => sub { + my $name = $File::Find::name; + if (-d $name) { + _fix_perms($name, $owner_id, $group_id, $perms->{dirs}); + } + else { + _fix_perms($name, $owner_id, $group_id, $perms->{files}); + } + }}, $dir); +} + sub _check_web_server_group { my ($output) = @_; diff --git a/contrib/.cvsignore b/contrib/.cvsignore new file mode 100644 index 000000000..03c88fd7a --- /dev/null +++ b/contrib/.cvsignore @@ -0,0 +1 @@ +.htaccess diff --git a/t/.cvsignore b/t/.cvsignore new file mode 100644 index 000000000..03c88fd7a --- /dev/null +++ b/t/.cvsignore @@ -0,0 +1 @@ +.htaccess |