[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Ruby Gem Flash Tool 0.6.0 Remote code execution vulnerability
- To: full <full-disclosure@xxxxxxxxxxxxxxxxx>
- Subject: [Full-disclosure] Ruby Gem Flash Tool 0.6.0 Remote code execution vulnerability
- From: "Larry W. Cashdollar" <larry0@xxxxxx>
- Date: Sun, 03 Mar 2013 23:08:53 +0000 (GMT)
<html><body><div><pre>Flash Tool 0.6.0 Remote code execution
vulnerability<br><br>3/1/2013<br><br>http://rubygems.org/gems/flash_tool<br><br>https://github.com/milboj/flash_tool<br><br>If
files downloaded contain shell characters it's possible to execute
code as the client user.
ie: flash_file;id>/tmp/o;.swf
./flash_tool-0.6.0/lib/flash_tool.rb
Lines:
26 command = "swfstrings #{file}"
27: output = `#{command} 2>&1`
88: command = "#{command} #{option} #{file}"
89: output = `#{command} 2>&1`
./flash_tool-0.6.0/lib/flash_tool/flash.rb
75: command = "#{command} #{args.join(" ")}"
76: output = `#{command} 2>&1`<br><br><br>@_larry0<br>Larry W.
Cashdollar<br>http://otiose.dhs.org/advisories/flash_tool-0.6.0-cmd_exec.html<br><br></pre></div></body></html>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/