Command injection vulnerability in Ruby Gem sprout 0.7.246

看板Bugtraq作者時間12年前 (2013/12/22 10:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
Title: Command injection vulnerability in Ruby Gem sprout 0.7.246 Date: 11/14/2013 Download: http://rubygems.org/gems/sprout, http://projectsprouts.org/ Vulnerability: The unpack_zip() function contains the following code: sprout-0.7.246/lib/sprout/archive_unpacker.rb 60 zip_dir =3D File.expand_path(File.dirname(zip_file)) 61 zip_name =3D File.basename(zip_file) 62 output =3D File.expand_path(dir) 63 # puts ">> zip_dir: #{zip_dir} zip_name: #{zip_name} = output: #{output} " =20 64 %x(cd #{zip_dir};unzip #{zip_name} -d #{output}) If the attacker can control zip_dir, zip_name or output then they can = possibly=20 execute shell commands by injecting shell meta characters as input.=20 PoC: For example: filename;id;.zip I contacted the developer a few weeks ago but received no response. Thanks! Larry W. Cashdollar @_larry0 http://vapid.dhs.org/advisories/=
文章代碼(AID): #1IjayhOb (Bugtraq)