Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-id: <5170ead4-5956-48e3-919d-4ae4910f7b26@me.com>
Date: Tue, 26 Mar 2013 15:55:51 +0000 (GMT)
From: "Larry W. Cashdollar" <larry0@...com>
To: oss-security@...ts.openwall.com
Subject: Re: Ruby gem Thumbshooter 0.1.5 remote code execution

Hello all,

May I please have a CVE assigned to this vulnerability? 

Thanks!

On Mar 26, 2013, at 04:23 AM, larry Cashdollar <larry0@...com> wrote:

> Ruby gem Thumbshooter 0.1.5 remote code execution
>
> 3/25/2013
> Generates thumbshots of URLs by using Webkit and QT4.
>
> https://github.com/digineo/thumbshooter
>
> Specially crafted URLs can result in remote code execution if the URL contains shell metacharacters.
>
> We see that the url is passed directly to the shell in the following code snippet from ./thumbshooter-0.1.5/lib/thumbshooter.rb lines:
>
> 1012 command << "xvfb-run -a --server-args='-screen 0, #{screen}x24' "
> 1015 command << "{WEBKIT2PNG} '{url}' {args}"
> 1017 img = `{command} 2>&1`
> Larry W. Cashdollar
> @_larry0
> http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html
>
>
> Larry C$
Content of type "text/html" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.