lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 26 Mar 2013 15:13:23 +0000 (GMT)
From: "Larry W. Cashdollar" <larry0@...com>
To: full <full-disclosure@...ts.grok.org.uk>
Subject: Ruby gem Thumbshooter 0.1.5 remote command
execution
Ruby gem Thumbshooter 0.1.5 remote command execution
3/25/2013
Generates thumbshots of URLs by using Webkit and QT4.
https://github.com/digineo/thumbshooter
Specially crafted URLs can result in remote code execution if the URL contains shell metacharacters.
We see that the url is passed directly to the shell in the following code snippet from ./thumbshooter-0.1.5/lib/thumbshooter.rb lines:
1012 command << "xvfb-run -a --server-args='-screen 0, #{screen}x24' "
1015 command << "{WEBKIT2PNG} '{url}' {args}"
1017 img = `{command} 2>&1`
Larry W. Cashdollar
@_larry0
http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists