|
Message-id: <F2F0C2DD-8F71-47DF-BC09-19D96CAFB644@me.com> Date: Tue, 26 Mar 2013 07:23:03 -0400 From: larry Cashdollar <larry0@...com> To: Open Source Security <oss-security@...ts.openwall.com> Subject: Ruby gem Thumbshooter 0.1.5 remote code execution Ruby gem Thumbshooter 0.1.5 remote code execution 3/25/2013 Generates thumbshots of URLs by using Webkit and QT4. https://github.com/digineo/thumbshooter Specially crafted URLs can result in remote code execution if the URL contains shell metacharacters. We see that the url is passed directly to the shell in the following code snippet from ./thumbshooter-0.1.5/lib/thumbshooter.rb lines: 1012 command << "xvfb-run -a --server-args='-screen 0, #{screen}x24' " 1015 command << "{WEBKIT2PNG} '{url}' {args}" 1017 img = `{command} 2>&1` Larry W. Cashdollar @_larry0 http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html Larry C$
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.