summaryrefslogtreecommitdiffstats
path: root/source/web/cgi.c
diff options
context:
space:
mode:
authorKai Blin <kai@samba.org>2011-07-12 08:08:24 +0200
committerKarolin Seeger <kseeger@samba.org>2011-07-24 20:46:46 +0200
commit3973cfa50024983618a44ffdb9f756b642b85be7 (patch)
tree9e9dccbb21a40cc573643b9231ebcb4d2bf4f61b /source/web/cgi.c
parent11e281228f334bf3d384df5655136f0b4b4068aa (diff)
downloadsamba-3973cfa50024983618a44ffdb9f756b642b85be7.tar.gz
samba-3973cfa50024983618a44ffdb9f756b642b85be7.tar.xz
samba-3973cfa50024983618a44ffdb9f756b642b85be7.zip
s3 swat: Create random nonce in CGI mode
In CGI mode, we don't get access to the user's password, which would reduce the hash used so far to parameters an attacker can easily guess. To work around this, read the nonce from secrets.tdb or generate one if it's not there. Also populate the C_user field so we can use that for token creation. Signed-off-by: Kai Blin <kai@samba.org> The last 12 patches address bug #8290 (CSRF vulnerability in SWAT). This addresses CVE-2011-2522 (Cross-Site Request Forgery in SWAT).
Diffstat (limited to 'source/web/cgi.c')
-rw-r--r--source/web/cgi.c18
1 files changed, 17 insertions, 1 deletions
diff --git a/source/web/cgi.c b/source/web/cgi.c
index ccdc3a73e4d..890ac8e66a6 100644
--- a/source/web/cgi.c
+++ b/source/web/cgi.c
@@ -19,6 +19,7 @@
#include "includes.h"
#include "web/swat_proto.h"
+#include "secrets.h"
#define MAX_VARIABLES 10000
@@ -321,7 +322,22 @@ static void cgi_web_auth(void)
exit(0);
}
- setuid(0);
+ C_user = SMB_STRDUP(user);
+
+ if (!setuid(0)) {
+ C_pass = secrets_fetch_generic("root", "SWAT");
+ if (C_pass == NULL) {
+ char *tmp_pass = NULL;
+ tmp_pass = generate_random_str(16);
+ if (tmp_pass == NULL) {
+ printf("%sFailed to create random nonce for "
+ "SWAT session\n<br>%s\n", head, tail);
+ exit(0);
+ }
+ secrets_store_generic("root", "SWAT", tmp_pass);
+ C_pass = SMB_STRDUP(tmp_pass);
+ }
+ }
setuid(pwd->pw_uid);
if (geteuid() != pwd->pw_uid || getuid() != pwd->pw_uid) {
printf("%sFailed to become user %s - uid=%d/%d<br>%s\n",