Vulnerabilities > CVE-2007-6610 - Remote Arbitrary Shell Command Injection vulnerability in Debian UNP 1.0.12

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
debian
critical
nessus

Summary

unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product.

Vulnerable Configurations

Part Description Count
Application
Debian
2

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200801-01.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200801-01 (unp: Arbitrary command execution) Erich Schubert from Debian discovered that unp does not escape file names properly before passing them to calls of the shell. Impact : A remote attacker could entice a user or automated system to unpack a compressed archive with a specially crafted file name, leading to the execution of shell commands from within the filename. That code will be executed with the privileges of the user running unp. Workaround : There is no known workaround at this time.
last seen2020-06-01
modified2020-06-02
plugin id29905
published2008-01-10
reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/29905
titleGLSA-200801-01 : unp: Arbitrary command execution
code
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200801-01.
#
# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include("compat.inc");

if (description)
{
  script_id(29905);
  script_version("1.14");
  script_cvs_date("Date: 2019/08/02 13:32:44");

  script_cve_id("CVE-2007-6610");
  script_xref(name:"GLSA", value:"200801-01");

  script_name(english:"GLSA-200801-01 : unp: Arbitrary command execution");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200801-01
(unp: Arbitrary command execution)

    Erich Schubert from Debian discovered that unp does not escape file
    names properly before passing them to calls of the shell.
  
Impact :

    A remote attacker could entice a user or automated system to unpack a
    compressed archive with a specially crafted file name, leading to the
    execution of shell commands from within the filename. That code will be
    executed with the privileges of the user running unp.
  
Workaround :

    There is no known workaround at this time."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200801-01"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All unp users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose '>=app-arch/unp-1.0.14'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:unp");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2008/01/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2008/01/10");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"app-arch/unp", unaffected:make_list("ge 1.0.14"), vulnerable:make_list("lt 1.0.14"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "unp");
}

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 27182 CVE(CAN) ID: CVE-2007-6610 unp是用于在Debian平台下使用的压缩解压文档的perl脚本。 unp处理文件名时存在漏洞,本地攻击者可能利用此漏洞通过诱使用户执行特定操作来提升权限。 unp没有正确地转义文件名,如果执行以下操作的话: touch empty zip \`ls\`.zip empty unp \`ls\`.zip 就会给出目录列表。这意味着任何使用unp进行解压的应用程序都受基于文件名的命令注入攻击的影响。 DebianHelp unp &lt; 1.0.14 厂商补丁: Gentoo ------ Gentoo已经为此发布了一个安全公告(GLSA-200801-01)以及相应补丁: GLSA-200801-01:unp: Arbitrary command execution 链接:<a href=http://security.gentoo.org/glsa/glsa-200801-01.xml target=_blank>http://security.gentoo.org/glsa/glsa-200801-01.xml</a> 所有unp用户都应升级到最新版本: # emerge --sync # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/unp-1.0.14&quot; DebianHelp ---------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://www.debianhelp.co.uk/unp.htm target=_blank>http://www.debianhelp.co.uk/unp.htm</a>
idSSV:2799
last seen2017-11-19
modified2008-01-10
published2008-01-10
reporterRoot
titleunp文件名远程任意Shell命令注入漏洞