[VIM] SquirrelMail GPG Plugin Vulnerabilities

George A. Theall theall at tenablesecurity.com
Tue Jul 10 01:46:25 UTC 2007


I'm trying to make sense of the spate of recent vulnerabilities 
associated with the GPG Plugin for SquirrelMail.

o There's the WabiSabiLabi advisory (ZD-00000004) that sparked the 
interest. It supposedly affects version 2.0 of the plugin, is remotely 
exploitable, and allows for command execution.

o The author released version 2.1 of the plugin on 7/7 and says it 
"contains security fixes to prevent possible command injection attacks 
by local authenticated users against the webserver user." I don't find 
any reference in the release or on the author's site to the WabiSabiLabi 
advisory per se, and the CVS commit log for the software, at 
<http://www.braverock.com/gpg/statcvs/commit_log.html>, shows only a 
single change in 2007, made on 7/7, for a local file include issue in 
the 'gpg_pop_init.php' script as noted by Stefan Esser. [A quick check 
shows that it involves the 'MOD' parameter and can be exploited remotely 
without authentication.]

o http://lists.immunitysec.com/pipermail/dailydave/2007-July/004448.html 
is a post made by Charlie Miller on 7/6 to Daily Dave in which he 
suggests the issue underlying ZD-00000004 might involve $passphrase in 
gpg_sign_attachment() although he has not actually verified it.

o http://lists.immunitysec.com/pipermail/dailydave/2007-July/004452.html 
is a post made Nicob on 7/8 to Daily Dave that mentions an attack vector 
fixed in version 2.1 but provides no specifics.

o http://lists.immunitysec.com/pipermail/dailydave/2007-July/004453.html 
is a post from Stefan Esser on 7/9 to Daily Dave that asserts there are 
several more shell command execution flaws in version 2.1 that the 
vendor is aware of. Unfortunately, he provides no specifics.

o http://lists.immunitysec.com/pipermail/dailydave/2007-July/004456.html 
is a post made by Nicob on 7/9 to Daily Dave that details an attack 
vector involving the gpg_check_sign_pgp_mime() function in 
gpg_hook_functions.php.

So, how are you VDB folks sorting all this out? I've noticed so far that 
Bugtraq 24782 maps to WabiSabiLabi's advisory (although oddly it claims 
the issue has now been resolved with version 2.1 of the plugin) and 
24828 to Esser's posting.

Am I getting all this straight?

George
-- 
theall at tenablesecurity.com


More information about the VIM mailing list