Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ability to do code injection via logging module configuration listener port. #59650

Closed
grahamd mannequin opened this issue Jul 25, 2012 · 4 comments
Closed

Ability to do code injection via logging module configuration listener port. #59650

grahamd mannequin opened this issue Jul 25, 2012 · 4 comments
Labels
stdlib Python modules in the Lib dir type-security A security issue

Comments

@grahamd
Copy link
Mannequin

grahamd mannequin commented Jul 25, 2012

BPO 15445
Nosy @vsajip, @vstinner, @tiran

Note: these values reflect the state of the issue at the time it was migrated and might not reflect the current state.

Show more details

GitHub fields:

assignee = None
closed_at = <Date 2012-07-25.18:20:55.288>
created_at = <Date 2012-07-25.00:14:25.889>
labels = ['type-security', 'library']
title = 'Ability to do code injection via logging module configuration listener port.'
updated_at = <Date 2012-07-25.18:20:55.286>
user = 'https://bugs.python.org/grahamd'

bugs.python.org fields:

activity = <Date 2012-07-25.18:20:55.286>
actor = 'python-dev'
assignee = 'none'
closed = True
closed_date = <Date 2012-07-25.18:20:55.288>
closer = 'python-dev'
components = ['Library (Lib)']
creation = <Date 2012-07-25.00:14:25.889>
creator = 'grahamd'
dependencies = []
files = []
hgrepos = []
issue_num = 15445
keywords = []
message_count = 4.0
messages = ['166343', '166346', '166382', '166417']
nosy_count = 6.0
nosy_names = ['vinay.sajip', 'vstinner', 'christian.heimes', 'grahamd', 'Arfrever', 'python-dev']
pr_nums = []
priority = 'normal'
resolution = 'fixed'
stage = 'resolved'
status = 'closed'
superseder = None
type = 'security'
url = 'https://bugs.python.org/issue15445'
versions = ['Python 2.7', 'Python 3.2', 'Python 3.3']

@grahamd
Copy link
Mannequin Author

grahamd mannequin commented Jul 25, 2012

This issue was raised first on security@python.org. Guido responded that not sensitive enough to be kept to the list and that okay to log a bug report.

This issue may not warrant any action except perhaps an update to
documentation for the logging module to warn about it, but thought
that should raise it just in case someone felt it needed actual code
changes to be made to avoid the issue if possible.

The problem arises in the Python logging modules ability to create a
listener socket which can accept new configuration in the ini file
format.

http://docs.python.org/library/logging.config.html#logging.config.listen

"""To send a configuration to the socket, read in the configuration
file and send it to the socket as a string of bytes preceded by a
four-byte length string packed in binary using struct.pack('>L',
n)."""

This sounds innocuous and the documentation at that point doesn't warn
that you are opening yourself up to security problems in using it.

You get a hint of potential issues later if one reads later
documentation about the file format:

"""The class entry indicates the handler’s class (as determined by
eval() in the logging package’s namespace). The level is interpreted
as for loggers, and NOTSET is taken to mean ‘log everything’."""

There are other mentions about eval() in context of log level and args
for the handler class as well, but not sure that is used for log level
as it says.

The combination of the open listener port for configuration and that
processing of the configuration file uses eval(), means that one could
send a configuration file to the process containing:

[handler_consoleHandler]
class=os.system('echo security issue') or StreamHandler
level=DEBUG
formatter=simpleFormatter
args=(sys.stdout,)

and one could execute an arbitrary command as the user the process runs as.

The problem is tempered by the fact that someone has to enable the
feature, which is likely rare, but also because socket connections to
send new configuration will only be accepted from the same host
('localhost') and the host can not be overridden. So can only be taken
advantage of by someone (potentially a different user) on the same
host and not remotely at least.

The specific code in Python 3.2 is:

        section = cp["handler_%s" % hand]
        klass = section["class"]
        fmt = section.get("formatter", "")
        try:
            klass = eval(klass, vars(logging))
        except (AttributeError, NameError):
            klass = _resolve(klass)
        args = section["args"]
        args = eval(args, vars(logging))
        h = klass(*args)

and older Python 2.X versions have similar code.

Although you could perhaps avoid need for eval for class lookup, can't
see that you could do that for args unless you restrict it to literal
values and use a more limited eval like parser.

At the minimum there probably should be a warning in the documentation about using the logging module configuration port on untrusted systems with shared users.

@grahamd grahamd mannequin added stdlib Python modules in the Lib dir type-security A security issue labels Jul 25, 2012
@tiran
Copy link
Member

tiran commented Jul 25, 2012

ast.literal_eval() is a good choice for limited evaluation of Python string as it only supports data types like numbers, str, dict etc. but no classes or function calls.

@vsajip
Copy link
Member

vsajip commented Jul 25, 2012

I think it is sufficient for 2.7, 3.2 and 3.3 to just update the documentation, as Graham says, using "note" markup so that it stands out.

I can look at ast.literal_eval as an option for 3.4.

@python-dev
Copy link
Mannequin

python-dev mannequin commented Jul 25, 2012

New changeset f30b49a5072e by Vinay Sajip in branch '2.7':
Issue bpo-15445: Updated logging configuration documentation to highlight potential security risk posed by listen() in certain scenarios.
http://hg.python.org/cpython/rev/f30b49a5072e

New changeset e5d7d202f2bf by Vinay Sajip in branch '3.2':
Issue bpo-15445: Updated logging configuration documentation to highlight potential security risk posed by listen() in certain scenarios.
http://hg.python.org/cpython/rev/e5d7d202f2bf

New changeset 410be02de1c6 by Vinay Sajip in branch 'default':
Closes bpo-15445: Merged documentation update from 3.2.
http://hg.python.org/cpython/rev/410be02de1c6

@python-dev python-dev mannequin closed this as completed Jul 25, 2012
@ezio-melotti ezio-melotti transferred this issue from another repository Apr 10, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
stdlib Python modules in the Lib dir type-security A security issue
Projects
None yet
Development

No branches or pull requests

2 participants