|
Message-id: <5170ead4-5956-48e3-919d-4ae4910f7b26@me.com>
Date: Tue, 26 Mar 2013 15:55:51 +0000 (GMT)
From: "Larry W. Cashdollar" <larry0@...com>
To: oss-security@...ts.openwall.com
Subject: Re: Ruby gem Thumbshooter 0.1.5 remote code execution
Hello all,
May I please have a CVE assigned to this vulnerability?
Thanks!
On Mar 26, 2013, at 04:23 AM, larry Cashdollar <larry0@...com> wrote:
> Ruby gem Thumbshooter 0.1.5 remote code execution
>
> 3/25/2013
> Generates thumbshots of URLs by using Webkit and QT4.
>
> https://github.com/digineo/thumbshooter
>
> Specially crafted URLs can result in remote code execution if the URL contains shell metacharacters.
>
> We see that the url is passed directly to the shell in the following code snippet from ./thumbshooter-0.1.5/lib/thumbshooter.rb lines:
>
> 1012 command << "xvfb-run -a --server-args='-screen 0, #{screen}x24' "
> 1015 command << "{WEBKIT2PNG} '{url}' {args}"
> 1017 img = `{command} 2>&1`
> Larry W. Cashdollar
> @_larry0
> http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html
>
>
> Larry C$
Content of type "text/html" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.