oss-sec mailing list archives
CVE Request -- autojump: autojump profile will load random stuff from a directory called custom_install
From: Jan Lieskovsky <jlieskov () redhat com>
Date: Thu, 25 Apr 2013 12:22:58 -0400 (EDT)
Hello Kurt, Steve, vendors, a security flaw was found in the way autojump, a tool for faster filesystem navigation from the command line, used to honour content of custom_install directory when global and local autojump installations were not found, and $SHELL variable was unset or set to different value than bash or zsh. If an unsuspecting autojump user was tricked into running autojump script from the directory a local attacker has write access to, this flaw could be used for arbitrary (Python) code execution with the privileges of the user running the autojump binary / script. Relevant (final) upstream patches are as follows: [1] https://github.com/joelthelion/autojump/commit/ad09ee27d402be797b3456abff6edeb4291edfec [2] https://github.com/joelthelion/autojump/commit/c763b2afadb188ab52849c21d43d2e8fe5b8800a References: [3] https://bugzilla.redhat.com/show_bug.cgi?id=950777 Credit: This issue was found and reported to Red Hat Bugzilla [3] by Zbigniew Jędrzejewski-Szmek. Thanks also goes to Jan Pokorny for bringing this one to my attention, and to William Ting of autojump upstream for promptly fixing the issue. Could you allocate a CVE identifier for this? Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Current thread:
- CVE Request -- autojump: autojump profile will load random stuff from a directory called custom_install Jan Lieskovsky (Apr 25)