TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

/bin/sh: the biggest Unix security loophole (1984) [pdf]

101 pointsby vitplister4 months ago

9 comments

panki274 months ago
I had the &quot;joy&quot; of watching some guys from Perforce setup a new p4 instance.<p>They confed &#x2F;etc&#x2F;sudoers so that the perforce user can run everything as root without providing a password. I told them that this is really a bad idea, and they pulled up one of their setup guides with &quot;enhanced security hardening&quot;.<p>It ended up with ~35 specific entries for binaries in sudoers, one of them being &#x2F;usr&#x2F;sbin&#x2F;setcap - which allows you to give e.g. the Python interpreter CAP_SETUID, making a privilege escalation to root trivial again.
评论 #42667739 未加载
supriyo-biswas4 months ago
Loopholes of this kind exist these days as well.<p>When I was working for a major retailer, who, you&#x27;d assume would have thought about these things well enough, you were prevented from executing sudo, except for being able to use it for text editing (sudo vi). I needed to install some packages with a root shell at the time, so I used the command execution feature within vi to get that.
评论 #42644870 未加载
评论 #42647941 未加载
评论 #42667307 未加载
评论 #42670272 未加载
评论 #42647920 未加载
评论 #42649262 未加载
评论 #42649842 未加载
评论 #42668464 未加载
评论 #42653970 未加载
mixdup4 months ago
Setting aside all of the technical aspects of this, the history of this in the world of UNIX, I just love the process and bureaucracy that generated this specific paper document. The very formal cover sheet (and the fact that it had an accompanying, separate, numbered instruction document), the pre-determined layout and format of a Technical Memorandum, and the fact that this was published as such a memorandum with filing and control numbers that will be researched and looked up in a library instead of just a blog or post on Medium<p>We used to be a real society
评论 #42669600 未加载
teddyh4 months ago
&gt; <i>They did not invent UNIX but they try harder</i><p>I fear that this reference to an old Avis advertising slogan may be lost to a modern audience.
0xbadcafebee4 months ago
It&#x27;s the same today, only it&#x27;s webapps instead of unix utilities. Simplest bugs in the world, still devs don&#x27;t pay attention to them. Simple like not sanitizing inputs, injecting stuff straight into sql queries or exec commands, dumping customer data &#x2F; passwords &#x2F; all environment variables into logs and error messages, etc.
pengaru4 months ago
Wow, they even used the accurate term &quot;crackers&quot;, I feel so old.
评论 #42669109 未加载
评论 #42667168 未加载
athrowaway3z4 months ago
&gt;Ritchie is the inventor of the elegant setuid concept, for which a patent was awarded.<p>Do organization still apply for these kind of patents?
评论 #42670797 未加载
评论 #42669103 未加载
zahlman4 months ago
Interesting piece of history. The actual exploit techniques have a real flavour of SQL injection about them.
chrisding4 months ago
Interesting piece of history.