CONDOR-2008-0001
Summary: |
|
||||||||||||||||||||||||
It is possible for a user that can submit jobs to a condor_schedd to modify arbitrary attributes of the job, including attributes an ordinary user should not be able to modify. For instance, a user can change the owner of their job to run as any non-root user. |
|||||||||||||||||||||||||
| |||||||||||||||||||||||||
Access Required: |
local ordinary user with a condor authorization |
||||||||||||||||||||||||
This vulnerability requires local access on a machine where the user has write authorization to the condor_schedd (i.e., a host and account where the user can submit a job). |
|||||||||||||||||||||||||
Effort Required: |
low |
||||||||||||||||||||||||
The use of ordinary condor command line tools is all that is required to exploit this vulnerability. |
|||||||||||||||||||||||||
Impact/Consequences: |
high |
||||||||||||||||||||||||
The attacker can run arbitrary code as a non-root user on the execute host or submission host depending on the job type. This can allow attacks on other users accounts or system resources. |
|||||||||||||||||||||||||
Full Details: |
|
||||||||||||||||||||||||
There is a list of sensitive job attributes that an ordinary user is not allowed to modify to ensure the security of the system. These include the "owner" attribute. When a job is submitted, its attributes are checked and a sensitive attribute is not allowed to be set. The user can also use
|
|||||||||||||||||||||||||
Cause: |
injection |
||||||||||||||||||||||||
The attribute name supplied from |
|||||||||||||||||||||||||
Actual Fix: |
|
||||||||||||||||||||||||
Whitespace and other illegal characters in the attribute name are now
rejected in the check of attribute names supplied by
|