Walter Webcoder has a great idea for a portal site: The Web Arithmetic
Page. Surrounded by all sorts of cool mathematical links and banner
ads that will make him rich is a simple central frame, containing a
text field and a button. Users type an arithmetic expression into the
field, press the button, and the answer is displayed. All the world's
calculators become obsolete overnight, and Walter cashes in and retires to
devote his life to his collection of car license plate numbers.
Implementing the calculator is easy, thinks Walter. He accesses the
contents of the form field using Ruby's CGI library, and uses
the eval method to evaluate the string as an expression.
require 'cgi'
cgi = CGI::new("html4")
# Fetch the value of the form field "expression"
expr = cgi["expression"].to_s
begin
result = eval(expr)
rescue Exception => detail
# handle bad expressions
end
# display result back to user...
Roughly seven seconds after Walter puts the application online, a
twelve-year-old from Waxahachie with glandular problems and no real
life types ``system("rm *")'' into the form and, like his
application, Walter's dreams come tumbling down.
Walter learned an important lesson: All external data is
dangerous. Don't let it close to interfaces that can modify your
system. In this case, the content of the form field was the
external data, and the call to eval was the security breach.
Fortunately, Ruby provides support for reducing this risk. All
information from the outside world can be marked as
tainted. When running in a safe mode, potentially dangerous
methods will raise a SecurityError if passed a tainted object.
The variable $SAFE determines Ruby's level of paranoia.
Table 20.1 on page 257 gives details of the checks performed at
each safe level.
$SAFE
Constraints
0
No checking of the use of externally supplied (tainted) data is
performed. This is Ruby's default mode.
>= 1
Ruby disallows the use of tainted data by potentially
dangerous operations.
>= 2
Ruby prohibits the loading of program files from globally
writable locations.
>= 3
All newly created objects are considered tainted.
>= 4
Ruby effectively partitions the running program in two. Nontainted
objects may not be modified. Typically, this will be used to create a
sandbox: the program sets up an environment using a lower
$SAFE level, then resets $SAFE to 4 to prevent
subsequent changes to that environment.
The default value of $SAFE is zero under most circumstances.
However, if a Ruby script is run setuid or
setgid,[A Unix script may be flagged to be run under a
different user or group id than the person running it. This allows
the script to have privileges that the user does not have; the
script can access resources that the user would otherwise be
prohibited from using.
These scripts are called setuid or setgid.]
its safe
level is automatically set to 1. The safe level may also be set
using the -T
command-line option, and by assigning to
$SAFE within the program. It is not possible to lower the value
of $SAFE by assignment.
The current value of $SAFE is inherited when new threads are
created. However, within each thread, the value of $SAFE may be
changed without affecting the value in other threads. This facility
may be used to implement secure ``sandboxes,'' areas where external
code may run safely without risking the rest of your application or
system. Do this by wrapping code that you load from a
file in its own, anonymous module.
This will protect your
program's namespace from any unintended alteration.
f=open(fileName,"w")
f.print ... # write untrusted program into file.
f.close
Thread.start {
$SAFE = 4
load(fileName, true)
}
With a $SAFE level of 4, you can load only wrapped files.
See Kernel::load on page 418 for details.
Any Ruby object derived from some external source (for example, a
string read from a file, or an environment variable) is automatically
marked as being tainted. If your program uses a tainted object to
derive a new object, then that new object will also be tainted, as
shown in the code below. Any
object with external data somewhere in its past will be tainted. This
tainting process is performed regardless of the current safe level. You
can inspect the tainted status of an object using
Object#tainted?.
# internal data
# =============
x1 = "a string"
x1.tainted?
»
false
x2 = x1[2, 4]
x2.tainted?
»
false
x1 =~ /([a-z])/
»
0
$1.tainted?
»
false
# external data
# =============
y1 = ENV["HOME"]
y1.tainted?
»
true
y2 = y1[2, 4]
y2.tainted?
»
true
y1 =~ /([a-z])/
»
1
$1.tainted?
»
true
You can force any object to become tainted by invoking its
taint method. If the safe level is less than 3, you can
remove the taint from an object by invoking
untaint.[There are also some devious ways of doing
this without using untaint. We'll leave it up to your
darker side to find them.] This is clearly not something to do
lightly.
Clearly, Walter should have run his CGI script at a safe level of
1. This would have raised an exception when the program tried to
pass form data to eval. Once this had happened, Walter would
have had
a number of choices. He could have chosen to implement a proper expression
parser, bypassing the risks inherent in using eval. However,
being lazy, it's more likely he'd have performed some simple sanity check on
the form data, and untaint it if it looked innocuous.
require 'cgi';
$SAFE = 1
cgi = CGI::new("html4")
expr = cgi["field"].to_s
if expr =~ %r{^-+*/\d\seE.()*$}
expr.untaint
result = eval(expr)
# display result back to user...
else
# display error message...
end
Personally, we think Walter's still taking undue risks. We'd probably
prefer to see a real parser here, but implementing one here has
nothing to teach us about tainting, so we'll move on.
And remember---it's a dangerous world out there. Be careful.
Definition of the safe levels
$SAFE >= 1
The environment variables RUBYLIB and RUBYOPT are not
processed, and the current directory is not added to the path.
The command-line options -e, -i, -I, -r,
-s, -S, and -x are
not allowed.
Can't start processes from $PATH if any directory
in it is world-writable.
Can't manipulate or chroot to a directory whose name is a tainted string.
Can't glob tainted strings.
Can't eval tainted strings.
Can't load or require a file whose name is a tainted string.
Can't manipulate or query the status of a file or pipe whose
name is a tainted string.
Can't execute a system command or exec a program from a
tainted string.
Can't pass trap a tainted string.
$SAFE >= 2
Can't change, make, or remove directories, or use chroot.
Can't load a file from a world-writable directory.
Can't load a file from a tainted filename starting with ~.