Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 02 Dec 2013 21:48:10 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Command injection vulnerability in Ruby Gem sprout
 0.7.246

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/02/2013 05:13 PM, Larry W. Cashdollar wrote:
> Title: Command injection vulnerability in Ruby Gem sprout 0.7.246
> 
> Download: http://rubygems.org/gems/sprout,
> http://projectsprouts.org/
> 
> Vulnerability:
> 
> The unpack_zip() function contains the following code:
> 
> sprout-0.7.246/lib/sprout/archive_unpacker.rb
> 
> 60           zip_dir = File.expand_path(File.dirname(zip_file)) 61
> zip_name = File.basename(zip_file) 62           output =
> File.expand_path(dir) 63           # puts ">> zip_dir: #{zip_dir}
> zip_name: #{zip_name} output: #{output}    " 64           %x(cd
> #{zip_dir};unzip #{zip_name} -d #{output})
> 
> 
> If the attacker can control zip_dir, zip_name or output then they
> can possibly execute shell commands by injecting shell meta
> characters as input.
> 
> 
> PoC:
> 
> For example: filename;id;.zip
> 
> I contacted the developer a few weeks ago but received no
> response.
> 
> 
> Thanks! Larry W. Cashdollar @_larry0 
> http://vapid.dhs.org/advisories/
> 

Please use CVE-2013-6421 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=og9A
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.