Closed
Description
Assume user A has access to a machine, and root has mounted an encrypted version of the user home directory with -allow_other
. Further assume that the user knows the master key. By quickly exchanging directories with symlinks in the original data, it is possible trick GoCryptFS into exposing unwanted parts of the file system.
Steps to reproduce:
- Create a regular reverse mount point
- Create a directory "test" in the original directory
- Access the corresponding encrypted directory in the mount point (
ls <encrypted dir>
) - Quickly delete the directory in the original data, and instead create a symlink pointing somewhere else, for example to
/root
- Access the encrypted directory again, it will now blindly follow the symlink and reveal the content of the target directory
I used a small script to reproduce this issue, manual execution is probably too slow. Even without -allow_other
this could be a security issue and could, for example, backup unwanted data instead of just the symbolic link.
Metadata
Metadata
Assignees
Labels
No labels