<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can .forward execute code? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820570#M741141</link>
    <description>The file /etc/mail/aliases and .forward have similar capabilities. The .forward file itself does not execute but it may contain directives such as: pipe mail to this script, and is exactly how you can filter or process email automatically as it is received. It's not exactly a backdoor since /etc/mail/aliases is owned by root and not writable by ordinary users. A user can place a .forward in their $HOME directory but the script will only run if the delivery process can run the script or program. This is likely where a security scan would be centered:&lt;BR /&gt; &lt;BR /&gt;ll /home/*/.forward&lt;BR /&gt; &lt;BR /&gt;If you grep for the | (pipe) symbol in aliases and .forward files, you will see any automated mail handling. Also look for procmail as another way to handle incoming email.</description>
    <pubDate>Mon, 10 Jul 2006 15:09:49 GMT</pubDate>
    <dc:creator>Bill Hassell</dc:creator>
    <dc:date>2006-07-10T15:09:49Z</dc:date>
    <item>
      <title>Can .forward execute code?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820567#M741138</link>
      <description>Working on a security cleanup assignment.  Heard mention that the UNIX .forward file can be used to execute code, acting like a back door.  Does anyone know if this applies to HP-UX?</description>
      <pubDate>Mon, 10 Jul 2006 09:56:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820567#M741138</guid>
      <dc:creator>Daniel M. Gonzales</dc:creator>
      <dc:date>2006-07-10T09:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: Can .forward execute code?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820568#M741139</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;It does not execute code.&lt;BR /&gt;&lt;BR /&gt;It can forward a users mail from his/her home directory to anywhere and can be used maliciously to relay spam. It should have tight permissions on it if it exists at all.&lt;BR /&gt;&lt;BR /&gt;It certainly should not have execute rights, or it could be modified to be a shell script that does execute code.&lt;BR /&gt;&lt;BR /&gt;It is much better to handle sendmail forwarding in the /etc/aliases file or in virtusertables genericstables which are controlled and owned by root.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 10 Jul 2006 09:58:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820568#M741139</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-07-10T09:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: Can .forward execute code?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820569#M741140</link>
      <description>Hi Daniel:&lt;BR /&gt;&lt;BR /&gt;The potential relates to the '.forward' file for UNIX in general.&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Mon, 10 Jul 2006 09:59:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820569#M741140</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2006-07-10T09:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: Can .forward execute code?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820570#M741141</link>
      <description>The file /etc/mail/aliases and .forward have similar capabilities. The .forward file itself does not execute but it may contain directives such as: pipe mail to this script, and is exactly how you can filter or process email automatically as it is received. It's not exactly a backdoor since /etc/mail/aliases is owned by root and not writable by ordinary users. A user can place a .forward in their $HOME directory but the script will only run if the delivery process can run the script or program. This is likely where a security scan would be centered:&lt;BR /&gt; &lt;BR /&gt;ll /home/*/.forward&lt;BR /&gt; &lt;BR /&gt;If you grep for the | (pipe) symbol in aliases and .forward files, you will see any automated mail handling. Also look for procmail as another way to handle incoming email.</description>
      <pubDate>Mon, 10 Jul 2006 15:09:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820570#M741141</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2006-07-10T15:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: Can .forward execute code?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820571#M741142</link>
      <description>yes. you can use .forward to invoke commands via pipes. once encountered a user which use this future to invoke backdoor by sending mail with a triggering word.</description>
      <pubDate>Fri, 14 Jul 2006 08:08:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/can-forward-execute-code/m-p/3820571#M741142</guid>
      <dc:creator>Ron Cohen</dc:creator>
      <dc:date>2006-07-14T08:08:49Z</dc:date>
    </item>
  </channel>
</rss>

