Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#56962 - [browserify] world writable directories in /usr/lib/node_modules/
Attached to Project:
Community Packages
Opened by BrLi (brli) - Friday, 05 January 2018, 08:16 GMT
Last edited by Levente Polyak (anthraxx) - Friday, 12 January 2018, 12:45 GMT
Opened by BrLi (brli) - Friday, 05 January 2018, 08:16 GMT
Last edited by Levente Polyak (anthraxx) - Friday, 12 January 2018, 12:45 GMT
|
DetailsDescription:
directory is global writable (777) Additional info: * package version(s) 15.0.0-1 * config and/or log files etc. Steps to reproduce: pacman -Syu from prior version pops the warning about different permission between package(777) and filesystem(which is 755) |
This task depends upon
Closed by Levente Polyak (anthraxx)
Friday, 12 January 2018, 12:45 GMT
Reason for closing: Fixed
Additional comments about closing: 15.1.0-2
Friday, 12 January 2018, 12:45 GMT
Reason for closing: Fixed
Additional comments about closing: 15.1.0-2
find "$pkgdir/usr" -type d -exec chmod 755 '{}' +
Seriously, just bsdtar -xvf browserify-15.0.0-1-any.pkg.tar.xz and look at all those world-writable directories, taking a list would be kind of awkward. ;)
(if https://git.archlinux.org/svntogit/community.git/log/trunk?h=packages/browserify tells the right history :D)
And, thanks @eschwartz for pointing this nodejs problem out.
Additionally, this should be considered a security issue, as I can do the following to attack people on shared machines:
1. Note that /usr/lib/node_modules/browserify is 777
2. mv /usr/lib/node_modules/bin{,2}
3. cp -r /usr/lib/node_modules/{bin2,bin}
4. Insert `mail-.ssh-to-thom()` and `rm -rf $HOME` into /usr/lib/node_modules/browserify/bin/cmd.js
5. Wait for them to run browserify.
I don't think this attack is limited to the `bin/` folder: you may also insert malicious code into any of the libraries included.