Re: SUID permission on Bash script
- From: Giorgos Keramidas <keramida@xxxxxxxxxxxxxxx>
- Date: Sat, 29 Aug 2009 06:18:34 +0300
On Sat, 29 Aug 2009 02:24:31 +0100, RW <rwmaillists@xxxxxxxxxxxxxx> wrote:
On Fri, 28 Aug 2009 11:54:19 +0300 Giorgos Keramidas <keramida@xxxxxxxxxxxxxxx> wrote:
On Fri, 28 Aug 2009 09:24:35 +0100, Jeronimo Calvo <jeronimocalvop@xxxxxxxxxxxxxx> wrote:
As far as i know, using SUID, script must runs with root
permissions... so i shoudnt get "Permission denied", what im doing
No it must not. There are security reasons why shell scripts are not
setuid-capable. You can find some of them in the archives of the
mailing list, going back at least until 1997.
I'm bit puzzled by this, previous threads have given the impression
that this is a myth, for example:
So are scripts actually incapable of running setuid?
If you hack at the kernel it may still be possible to run a script with
setuid or setgid permissions. IMO there is still the possibility for
many things to go wrong, especially with "quick and dirty" scripts.
For example, what do you think will happen if a setuid script forgets to
properly quote filenames in commands like:
echo $$ > $pidfile
# cleanup my pidfile
truncate -s $pidfile
and then I run the script with:
setuid.sh " /etc/master.passwd /tmp/foo"
If you guessed that the pid value was not saved anywhere, that because
of the lack of error checking nobody noticed, and that the final
truncate command may have just wiped your `master.passwd' file your
guess is probably right.
freebsd-questions@xxxxxxxxxxx mailing list
To unsubscribe, send any mail to "freebsd-questions-unsubscribe@xxxxxxxxxxx"
- Prev by Date: Re: SUID permission on Bash script
- Next by Date: Re: SUID permission on Bash script
- Previous by thread: Re: SUID permission on Bash script
- Next by thread: Re: SUID permission on Bash script