diff options
author | zeertzjq <zeertzjq@outlook.com> | 2023-10-28 10:06:43 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2023-10-28 10:06:43 +0800 |
commit | f97248db757ee300b7808c3dd67858d489b604fd (patch) | |
tree | d03dc89b0c34ec0fb4a02a0550309f15d98d082a /src/nvim/eval/funcs.c | |
parent | d2e7cc68e99019587a4c5184a47677a6837bbee9 (diff) | |
download | rneovim-f97248db757ee300b7808c3dd67858d489b604fd.tar.gz rneovim-f97248db757ee300b7808c3dd67858d489b604fd.tar.bz2 rneovim-f97248db757ee300b7808c3dd67858d489b604fd.zip |
vim-patch:9.0.2070: [security] disallow setting env in restricted mode (#25807)
Problem: [security] disallow setting env in restricted mode
Solution: Setting environment variables in restricted mode could
potentially be used to execute shell commands. Disallow this.
restricted mode: disable allow setting of environment variables
Setting environment variables in restricted mode, may have some unwanted
consequences. So, for example by setting $GCONV_PATH in restricted mode
and then calling the iconv() function, one may be able to execute some
unwanted payload, because the `iconv_open()` function internally uses
the `$GCONV_PATH` variable to find its conversion data.
So let's disable setting environment variables, even so this is no
complete protection, since we are not clearing the existing environment.
I tried a few ways but wasn't successful :(
One could also argue to disable the iconv() function completely in
restricted mode, but who knows what other API functions can be
influenced by setting some other unrelated environment variables.
So let's leave it as it is currently.
closes: vim/vim#13394
See: https://huntr.com/bounties/b0a2eda1-459c-4e36-98e6-0cc7d7faccfe/
https://github.com/vim/vim/commit/6b89dd6a7257a1e2e9c7ea070b407bc4674a5118
Co-authored-by: Christian Brabandt <cb@256bit.org>
Diffstat (limited to 'src/nvim/eval/funcs.c')
-rw-r--r-- | src/nvim/eval/funcs.c | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/src/nvim/eval/funcs.c b/src/nvim/eval/funcs.c index aae544f28d..c12fd9fd31 100644 --- a/src/nvim/eval/funcs.c +++ b/src/nvim/eval/funcs.c @@ -7436,6 +7436,13 @@ static void f_setenv(typval_T *argvars, typval_T *rettv, EvalFuncData fptr) char valbuf[NUMBUFLEN]; const char *name = tv_get_string_buf(&argvars[0], namebuf); + // seting an environment variable may be dangerous, e.g. you could + // setenv GCONV_PATH=/tmp and then have iconv() unexpectedly call + // a shell command using some shared library: + if (check_secure()) { + return; + } + if (argvars[1].v_type == VAR_SPECIAL && argvars[1].vval.v_special == kSpecialVarNull) { vim_unsetenv_ext(name); |