setuid为Perl脚本(Setuid to Perl script)

2019-09-17 03:47发布

我使用一个Perl脚本,删除从mqueue中文件夹中的数据sendmail的。

当我setuid到Perl脚本,并尝试从用户运行它,它抛出这条消息:

Insecure dependency in chdir while running setuid at /file/find

如何解决这个问题,并成功地执行root priveleges脚本?

!/usr/bin/perl

use strict;

my $qtool = "/usr/local/bin/qtool.pl";
my $mqueue_directory = "/var/spool/mqueue";
my $messages_removed = 0;

use File::Find;
# Recursively find all files and directories in $mqueue_directory
find(\&wanted, $mqueue_directory);

sub wanted {
   # Is this a qf* file?
   if ( /^qf(\w{14})/ ) {
      my $qf_file = $_;
      my $queue_id = $1;
      my $deferred = 0;
      my $from_postmaster = 0;
      my $delivery_failure = 0;
      my $double_bounce = 0;
      open (QF_FILE, $_);
      while(<QF_FILE>) {
         $deferred = 1 if ( /^MDeferred/ );
         $from_postmaster = 1 if ( /^S<>$/ );
         $delivery_failure = 1 if \
            ( /^H\?\?Subject: DELIVERY FAILURE: (User|Recipient)/ );
         if ( $deferred && $from_postmaster && $delivery_failure ) {
            $double_bounce = 1;
            last;
         }
      }
      close (QF_FILE);
      if ($double_bounce) {
         print "Removing $queue_id...\n";
         system "$qtool", "-d", $qf_file;
         $messages_removed++;
      }
   }
}

print "\n$messages_removed total \"double bounce\" message(s) removed from ";
print "mail queue.\n";

Answer 1:

“不安全的依赖”是一个Taint的事情: http://perldoc.perl.org/perlsec.html 。

污点被执行,因为你运行该脚本的setuid。 您需要指定untaint作为一个选项%关键文件::查找:

http://metacpan.org/pod/File::Find

my %options = (
    wanted => \&wanted,
    untaint => 1
);

find(\%options, $mqueue_directory);

你也应该看看的untaint_pattern在POD的文件::查找。



Answer 2:

你应该建立一个节目包装。 在几乎所有的UNIX系统,脚本不能通过setuid位获得root权限。 你可以在这里找到一些有用的例子http://www.tuxation.com/setuid-on-shell-scripts.html



文章来源: Setuid to Perl script
标签: linux perl