Secunia Security Advisory - Matthias -apoc- Hecker has discovered a security issue in rbot, which can be exploited by malicious people to bypass certain security restrictions.
6503c1bb291527908923c3a571dbe9f9bd6e41f3c903dea0a6285870feab5c57
----------------------------------------------------------------------
Use WSUS to deploy 3rd party patches
Public BETA
http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/
----------------------------------------------------------------------
TITLE:
rbot "reaction" Plugin rbot Command Execution Security Issue
SECUNIA ADVISORY ID:
SA38738
VERIFY ADVISORY:
http://secunia.com/advisories/38738/
DESCRIPTION:
Matthias -apoc- Hecker has discovered a security issue in rbot, which
can be exploited by malicious people to bypass certain security
restrictions.
The security issue is caused due to the "reaction" plugin allowing
unprivileged IRC users to set up arbitrary "cmd" reactions, which can
be exploited to e.g. execute arbitrary rbot commands with escalated
privileges by setting up a specially crafted "cmd" reaction and e.g.
tricking the bot owner into triggering the malicious reaction.
Note: In unstable versions this may also allow the execution of
arbitrary Ruby code.
The security issue is confirmed in version 0.9.14. Other versions may
also be affected.
SOLUTION:
Fixed in the GIT repository.
http://ruby-rbot.org/rbot-trac/changeset/a9565be1c9d5549b1cbc058bb0a097011e1dd778/
http://ruby-rbot.org/rbot-trac/changeset/7d2f231d66e125428c7c9a72588ecae93a11f987/
http://ruby-rbot.org/rbot-trac/changeset/66a33c3f8adaf0ebcd3c72298c6ad07c0561dc90/
PROVIDED AND/OR DISCOVERED BY:
Matthias -apoc- Hecker
ORIGINAL ADVISORY:
http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0426.html
http://ruby-rbot.org/rbot-trac/changeset/a9565be1c9d5549b1cbc058bb0a097011e1dd778/
http://ruby-rbot.org/rbot-trac/changeset/7d2f231d66e125428c7c9a72588ecae93a11f987/
http://ruby-rbot.org/rbot-trac/changeset/66a33c3f8adaf0ebcd3c72298c6ad07c0561dc90/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------