Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-id: <F2F0C2DD-8F71-47DF-BC09-19D96CAFB644@me.com>
Date: Tue, 26 Mar 2013 07:23:03 -0400
From: larry Cashdollar <larry0@...com>
To: Open Source Security <oss-security@...ts.openwall.com>
Subject: Ruby gem Thumbshooter 0.1.5 remote code execution

Ruby gem Thumbshooter 0.1.5 remote code execution

3/25/2013
Generates thumbshots of URLs by using Webkit and QT4.

https://github.com/digineo/thumbshooter

Specially crafted URLs can result in remote code execution if the URL contains shell metacharacters.

We see that the url is passed directly to the shell in the following code snippet from ./thumbshooter-0.1.5/lib/thumbshooter.rb lines:

 1012 command << "xvfb-run -a --server-args='-screen 0, #{screen}x24' " 
 1015 command << "{WEBKIT2PNG} '{url}' {args}"
 1017 img = `{command} 2>&1`
Larry W. Cashdollar
@_larry0
http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html


Larry C$

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.