Shell Command Injection in places.py plugin of mate-menu package
Bug #1422402 reported by
Bernd Dietzel
on 2015-02-16
This bug affects 1 person
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| | ubuntu-mate |
High
|
Unassigned | ||
Bug Description
Shell Comands can be executed because places.py of the Advanced Mate Menu uses the old commands.getoutput funktion.
/usr/lib/
###Line 182 :###
config = ConfigObj(home + "/.config/
tmpdesktopDir = config[
tmpdesktopDir = commands.
############
if ~/.config/
XDG_DESKTOP_
xterm will be executed on next start.
--> Please use subprocess.Popen() , not commands.
Related branches
| Bernd Dietzel (l-ubuntuone1104) wrote : | #1 |
| Bernd Dietzel (l-ubuntuone1104) wrote : | #2 |
Exploid demo Video
Martin Wimpress (flexiondotorg)
on 2015-02-19
| Changed in ubuntu-mate: | |
| status: | New → Triaged |
| importance: | Undecided → High |
Martin Wimpress (flexiondotorg)
on 2015-02-25
| Changed in ubuntu-mate: | |
| status: | Triaged → Fix Committed |
Martin Wimpress (flexiondotorg)
on 2015-03-09
| Changed in ubuntu-mate: | |
| status: | Fix Committed → Fix Released |
To post a comment you must log in.


The same possible shell injection in the plugin "appliations.py" in the function "add_to_desktop" :
Line 1128: getoutput( "echo " + tmpdesktopDir)
tmpdesktopDir = commands.
Line 1132 : desktopFile, desktopDir))
os.system("cp \"%s\" \"%s/\"" % (desktopEntry.