|
Message-ID: <529D628A.6090709@redhat.com> Date: Mon, 02 Dec 2013 21:48:10 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: Command injection vulnerability in Ruby Gem sprout 0.7.246 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/02/2013 05:13 PM, Larry W. Cashdollar wrote: > Title: Command injection vulnerability in Ruby Gem sprout 0.7.246 > > Download: http://rubygems.org/gems/sprout, > http://projectsprouts.org/ > > Vulnerability: > > The unpack_zip() function contains the following code: > > sprout-0.7.246/lib/sprout/archive_unpacker.rb > > 60 zip_dir = File.expand_path(File.dirname(zip_file)) 61 > zip_name = File.basename(zip_file) 62 output = > File.expand_path(dir) 63 # puts ">> zip_dir: #{zip_dir} > zip_name: #{zip_name} output: #{output} " 64 %x(cd > #{zip_dir};unzip #{zip_name} -d #{output}) > > > If the attacker can control zip_dir, zip_name or output then they > can possibly execute shell commands by injecting shell meta > characters as input. > > > PoC: > > For example: filename;id;.zip > > I contacted the developer a few weeks ago but received no > response. > > > Thanks! Larry W. Cashdollar @_larry0 > http://vapid.dhs.org/advisories/ > Please use CVE-2013-6421 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBAgAGBQJSnWKKAAoJEBYNRVNeJnmTsCQP/0JOzVgGlr/oLH3szDIwtU4Y IvRepWCAH0fZtWXmal9rY4bGaHlaRE61gTSnfn6+6Sj4psqNWU2wezwNdVkSwIbN G08vrEvNJ5b0k6yHUwsnPpYHbZUWCDpceK5aN/ZLoYUOQnZw5pCMjZ5jQpw6Do6t /9Cey9dKERSkJHDP2IOFwzSmAAQOfsX14/3VTzlaKHvhKUaQyCWNRvY5EXTZ/API X2Xz5z2N0AB7huQR7GU8EgYiXlsxPdr1XU1ZxfKp8WjgZhDW/F1WSa64Zyy2nFHX M/YSyHkzyHStMfDc2pFRiNZUHeqCle2GD9xlJc/GZmpMroQnYClmV9ZN+i3Fqr5V bRkZQ0NpLk+BumsXLpYUcPXZwOce2AI6OAZ6Qyf2leRH+4XqE7PsR5M3a3jE/pYJ CYrZ6ZpVRS1bSb8HPqYUUbelaMSE/2uRCo14s4yxg5I3Hq1Vu2pEXtYhQJfR8sur LdX1usO5DffmG0bVvjntqDcXTK0YLcuS/DrqLlo0+OlxySKzuOGZ672Dblvnn4Gw H4Zd/aJ44GmgAdtJC2nduM6kO/BhYa/d1ieRyujTvG4V96zsjxY6tbsZFJhOsEk1 pDKNUESYb3Bwm0FW/6nbJWF26I8t53ao+gPEEaivyOTdMdU+Ww7bEeC+2YO2AuCE CGtqiVx/cBkTRdJti47l =og9A -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.