Hi,

the_walrus...@manlymail.net writes:

> I have just found a command line injection security vuln in
> canto. The program fetches feeds from configured sites, and the
> feeds contain URLs that people may want to visit. If a user
> starts canto and chooses to go to one URL from one feed, canto
> constructs a sh command line to visit the URL, but it doesn't
> remove metachars. Therefore a malicious feed (owner turned bad,
> man in the middle attack if fetched with http) can put in bad
> data in all link and guid elements of the feed and use this to
> hack the user when they visit some of the URLs. Not good. See my
> conf.py and evil.rss files for an example. Sorry for my English!

Thanks for the report, I confirm that using evil.rss creates a /tmp/1337
file when trying to launch the url in a browser. It doesn't seem to be
fixed upstream.

Thanks,
Vincent


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to