NET-RPC client-side stack should sanitize pickled data
Bug #671926 reported by
Eduard Carreras i Nadal
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Odoo GTK Client (MOVED TO GITHUB) |
Fix Released
|
Critical
|
OpenERP sa GTK client R&D | ||
5.0 |
Confirmed
|
Critical
|
Stephane Wirtel (OpenERP) | ||
Odoo Web Client |
Won't Fix
|
Critical
|
OpenERP R&D Web Team | ||
5.0 |
Won't Fix
|
Critical
|
Stephane Wirtel (OpenERP) |
Bug Description
It's possible to execute arbritrary code on client using net-rpc (pickle protocol) see http://
If you use the client to connect to some demo server and this demo server is malicious, it can send malicious code which is executed in client side.
I attach a exploit server who sends code to execute to client. Run a ls -l and redirect the output to proof_of_
This bug was fixed in the server, but not in the client.
Affects versions 4.2, 5.X and 6.X
Related branches
lp://staging/~openerp-dev/openobject-client/trunk-bug-671926-nch
- tfr (Openerp): Pending requested
- Olivier Dony (Odoo): Pending requested
- Naresh(OpenERP): Pending requested
-
Diff: 59 lines (+20/-3)1 file modifiedbin/tiny_socket.py (+20/-3)
summary: |
- Remote code execution + Malicious servers could trigger code execution on clients using NET-RPC |
summary: |
- Malicious servers could trigger code execution on clients using NET-RPC + NET-RPC client-side stack should sanitize pickled data |
Changed in openobject-client-web: | |
assignee: | Stephane Wirtel (OpenERP) (stephane-openerp) → OpenERP SA's Web Client R&D (openerp-dev-web) |
milestone: | 6.0-rc2 → 6.0.2 |
Changed in openobject-client: | |
assignee: | Stephane Wirtel (OpenERP) (stephane-openerp) → OpenERP sa GTK client R&D (openerp-dev-gtk) |
milestone: | 6.0-rc2 → 6.0.2 |
Changed in openobject-client: | |
status: | Confirmed → In Progress |
Changed in openobject-client: | |
status: | Fix Committed → Fix Released |
Changed in openobject-client-web: | |
status: | Confirmed → Won't Fix |
To post a comment you must log in.
I'll open this bug to the community because one month without response and I think this is a critical issue.