Shell Command Injection when changing emblem with nemo

Bug #1502420 reported by Bernd Dietzel
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Linux Mint
Fix Committed
Undecided
Unassigned

Bug Description

Security Problem in LinuxMint with Cinnamon Desktop and the nemo filemanager Version 2.6.7

The Line 132 in the python script "nemo-emblems.py" is vulnerable for Code Injection :

os.system("touch \"%s\"" % self.filename) # touch the file (to force Nemo to re-render its icon)

Exploit Demo :
---------------------

1) start the nemo file manager

2) rename a folder with nemo to this folder name

";killall nemo;#

3) Now change the EMBLEM icon of the folder with nemo
    (rigthclick on the folder , choose a icon on the emblem tab)

4) nemo will be killed for a prove of concept.

This is only a simple Demo to do no harm to the user.
Each and every other command could be injected wich could do almost everything !

It's neraly the same issue as with he folder colors, i already reported on github
https://github.com/linuxmint/nemo/issues/970

So, do not use os.system() in any python script anymore, use subprocess please

information type: Private Security → Public Security
Revision history for this message
Michael Webster (miketwebster) wrote :
Changed in linuxmint:
status: New → Fix Committed
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.