Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >
article

KB-6186: How to avoid the unsafe pass while matching dzdo command?

Centrify DirectControl ,  

12 April,16 at 10:57 AM

Applies to: All versions of Centrify DirectAuthorize

Problem:

When a dzdo command is defined with elevated privilege and selects Glob expressions, adclient will do string pattern checking only.
If asterisk (*) is defined in the command, users can place any string, including using “/..” to traverse up the directory.

For example, the user granted with privileged command "vi /tmp/*" is able to sudoers file by executing command:


# dzdo vi /tmp/../etc/sudoers
User-added image

Workarounds:

Option 1:
In current version, please do not define "*" in command with Glob expressions.

Option 2:
Use Regular expressions.
Regular expressions will not accept "/../" as a valid expression and not allow the command to be executed.
 
Resolution:

Starting from Suite 2016.1 there is a new attribute in hierarchical zone Unix Command Right to allow dzdo/dzsh to check all command arguments and prevent navigation up a path hierarchy.
Please refer to the 'Prevent navigation up a path hierarchy' checkbox in Access Manager (Suite 2016.1).

Still have questions? Click here to log a technical support case, or collaborate with your peers in Centrify's Online Community.