Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.881475
Categoría:CentOS Local Security Checks
Título:CentOS Update for python-paste-script CESA-2012:1206 centos6
Resumen:The remote host is missing an update for the 'python-paste-script'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'python-paste-script'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Python Paste provides middleware for building and running Python web
applications. The python-paste-script package includes paster, a tool for
working with and running Python Paste applications.

It was discovered that paster did not drop supplementary group privileges
when started by the root user. Running 'paster serve' as root to start a
Python web application that will run as a non-root user and group resulted
in that application running with root group privileges. This could possibly
allow a remote attacker to gain access to files that should not be
accessible to the application. (CVE-2012-0878)

All paster users should upgrade to this updated package, which contains a
backported patch to resolve this issue. All running paster instances
configured to drop privileges must be restarted for this update to take
effect.

Affected Software/OS:
python-paste-script on CentOS 6

Solution:
Please install the updated packages.

CVSS Score:
5.1

CVSS Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2012-0878
48812
http://secunia.com/advisories/48812
50410
http://secunia.com/advisories/50410
RHSA-2012:1206
http://rhn.redhat.com/errata/RHSA-2012-1206.html
[oss-security] 20120223 CVE Request -- python-paste-script: Supplementary groups not dropped when started an application with "paster serve" as root
http://www.openwall.com/lists/oss-security/2012/02/23/1
[oss-security] 20120223 Re: CVE Request -- python-paste-script: Supplementary groups not dropped when started an application with "paster serve" as root
http://www.openwall.com/lists/oss-security/2012/02/23/4
http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471
https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4
https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve
https://bugzilla.redhat.com/show_bug.cgi?id=796790
CopyrightCopyright (C) 2012 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.