file_unmanaged_move() in Drupal 8 makes unreadable files readable

Created on 12 December 2024, 4 months ago

This issue was reported privately but has been approved for public discussion by the Drupal Security Team.

Problem/Motivation

Since Drupal 8, the file_unmanaged_move() function (replaced by \Drupal::service('file_system')->move() after Drupal 9) issues a rename() followed by a drupal_chmod(). The rename() works regardless of file permissions, so the drupal_chmod() then has the effect of making the new file readable/writable even when the original wasn't.

In Drupal 7, it's not an issue because drupal_chmod() runs after copy() rather than rename(), and copy() will fail on a file that the webserver can't read.

Whether this is directly exploitable or not I am not positive... You'd need (1) a file in the public files directory that deliberately has the above somewhat-unusual permissions, and (2) a contrib module installed that allows an attacker to affect the input to file_unmanaged_move(). I don't know of such a module off the top of my head, although it seems likely to me that one exists which allows users to deliberately move and rename files around the file system.

At the very least it seems like an API weakness to me, and I'm looking for guidance on this before allowing the rename() change to be backported to Drupal 7 via https://www.drupal.org/node/2752783 .

Steps to reproduce

  1. Create a file in the public files directory, e.g. original.txt, which is owned by the webserver user.
  2. Change permissions on the file so that the webserver can't read it, e.g. chmod 000 original.txt.
  3. Visit the file in a web browser and confirm that access is denied.
  4. Run this code as the webserver user: file_unmanaged_move('public://original.txt', 'public://new.txt');
  5. Visit the new file (new.txt) in a web browser and notice that the contents now appear on the screen.

Proposed resolution

TBD

Remaining tasks

TBD

User interface changes

TBD

Introduced terminology

TBD

API changes

TBD

Data model changes

TBD

Release notes snippet

TBD

🐛 Bug report
Status

Active

Version

11.0 🔥

Component

file system

Created by

🇦🇺Australia mingsong 🇦🇺

Live updates comments and jobs are added and updated live.
  • Security improvements

    It makes Drupal less vulnerable to abuse or misuse. Note, this is the preferred tag, though the Security tag has a large body of issues tagged to it. Do NOT publicly disclose security vulnerabilities; contact the security team instead. Anyone (whether security team or not) can apply this tag to security improvements that do not directly present a vulnerability e.g. hardening an API to add filtering to reduce a common mistake in contributed modules.

Sign in to follow issues

Merge Requests

Comments & Activities

  • Issue created by @mingsong
  • 🇦🇺Australia kim.pepper 🏄‍♂️🇦🇺Sydney, Australia

    Perhaps we should add an explicit check to see if the file is readable before the rename?

  • 🇦🇺Australia kim.pepper 🏄‍♂️🇦🇺Sydney, Australia
  • Pipeline finished with Success
    4 months ago
    Total: 1140s
    #369435
  • 🇺🇸United States smustgrave

    Change looks good. Mind filling out the issue summary though for the TBD sections. Will keep an eye out for this again.

  • 🇦🇺Australia kim.pepper 🏄‍♂️🇦🇺Sydney, Australia

    Updated the IS

  • 🇺🇸United States cmlara

    Worth asking:
    Should permissions just be retained?
    Should owner be retained?

    Thinking of other attack vectors (Quick visual review, not confirmed in the dev lab):
    1)
    File owned by www-data:some-other-group server runs as www-data:www-data permison 600 (only the web-server can read, no other users can) copied to same stream wrapper:
    file_unmanaged_move() will (even with this patch) make the file world and group readable, this could allow another process (not the webserver) (through either the group read, or the public read) to read the file.

    2)
    File owned by www-data:some-other-group server runs as www-data:www-data
    file_unmanaged_move() will either end up with the file being www-data:some-other-group OR www-data:-www-data (depends on if rename succeeds which will depend on if it crosses hard mount points or streamWrappers eg public:// to private://

    Implied the above question is that this is not limited to just the public:// scheme or a path inside the webserver docroot, it impacts all files that Drupal touches as the webserver would not be the only access vector.

    Systems admin hat on: Shell mv usually retains the users and permissions. I could very easily see devs not being aware of this and silently injecting some public exposure in random locations that allows sensitive information to leak.

    Tangent: I saw the chmod() line in the filesystem service and didn't even think twice about how far ranging these impacts would be until this issue randomly popped up in my feed.

  • 🇺🇸United States dorficus

    @cmlara do you think that adding checks for those potential attack vectors would be necessary for this issue to move forward? I can definitely see the concern of changing the owner of the file, however are we, or should we be, hardening to that point?

    I'll leave it to someone else to change the status from Needs Review to Needs Work based on the comment, but I definitely agree that if it is a concern then maybe we should address it ahead of time.

  • 🇺🇸United States cmlara
    however are we, or should we be, hardening to that point

    Is it hardening or fixing a bug would be a more fundamental question.

    The move function is called move not move_and_chmod_public_read().
    As I alluded to before, i work in the filesystem service as a contrib streamWrapper maintainer (s3fs) and this never even registered in my mind quick reading the code to implement in a decorator.

    I can’t imagine the average developer has thought how this might put their deployment at risk and did not expect move() to function as a normal move. For context I did see the Windows workaround at 0600 and always thought “ok private no big deal maybe breaks some stuff but should fail closed”

    I suspect the DST and core team are underestimating the culpability of core in this.

    I’m out with the flu so not in a spot to go digging through the CVE’s, CWE’s and CAPEC’s to find possible citations.

    The key part is this is two fold:

    1. We silently will perform a copy() when a rename fails (providing no signal to the caller they need to take actions for a change of ownership)
    2. We silently change the permissions without the request of the caller.

    Considering this method is suppose to be a drop in (more friendly OS agnostic replacement for php’s built-in move() it’s has already taken on higher responsibility. By hiding errors or has taken on the additional responsibility of being the secure error handler.

    I ran across a PHP package the other day that went as far as to use flysystem IIRC to do local file management, at one point it seemed like overkill, however when you think of scenarios like this it makes a bit more logical sense that you “trust a library instead of trying to implant it all yourself” (not suggesting we convert to flysystem, just pointing out file management responsibilities can be large).

    There a few assumptions in the following example however here is an example of what concerns me

    User1:

    $ touch private.key
    $ chown www-user:user-group private.key
    $ chmod 460 private.key
    User1 securely puts contents into private.key
    $ chmod 440 private.key
    $ mv private.key /var/www/not_doc_root/private.key
    

    User2 (not a memebr of user-group)

    $ cat var /www/not_doc_root/private.key 
    > File not readable.

    Some time in the future $fileSystem->move(‘/var/www/not_doc_root/private.key’, ‘/var/www/not_doc_root/private-old.key’) (inside a hook_update as part of center magament, as part of a user taking an action in IMCE, whatever).

    User2 (not a member of user-group)

    $ cat var /www/not_doc_root/private-old.key 
    > It is now time to go have some fun :)
    

    The above example shows local however simialr risks occur through remote frontends too (think of a server running multiple HTTP server daemons some process isolation scheme such as multiple docker containers with shared storage).

    Couple with full path disclosure vulnerabilities in core and you have even more fun (yes that is talking chained exploits, however it not like those have not happened in the past in 🐛 Maintenance pages leak sensitive environment information. Needs review and that we are sure they will never happen again in the future).

    Going back to the IS:

    (1) a file in the public files directory that deliberately has the above somewhat-unusual permissions, and (2) a contrib module installed that allows an attacker to affect the input to file_unmanaged_move(). I don't know of such a module off the top of my head,

    This would not be limited to just public:// when you consider the local vector, though yes public makes it a LOT easier.

    As for contrib module, IMCE would be a high-risk candidate to me unless it has already been proven that it can’t do so.

  • The Needs Review Queue Bot tested this issue. It fails the Drupal core commit checks. Therefore, this issue status is now "Needs work".

    This does not mean that the patch necessarily needs to be re-rolled or the MR rebased. Read the Issue Summary, the issue tags and the latest discussion here to determine what needs to be done.

    Consult the Drupal Contributor Guide to find step-by-step guides for working with issues.

Production build 0.71.5 2024