Hi hhaamu,
* [EMAIL PROTECTED] <[EMAIL PROTECTED]> [2008-01-27 20:37]:
> Comix uses insufficient shell escaping when calling external programs
> (rar/unrar, jpegtran)
> 
> 
>  6280                         files = \
>  6281                             os.popen(self.rar + ' vb "' + path +
>  6282                                 '"').readlines()
> 
> 
>  6305                             os.popen(self.rar + ' p -inul -- "' + path 
> +       '" "' +
>  6306                                 cover + '" > "' + thumb_dir +
>  6307                                 '/temp" 2>/dev/null', "r").close()
> 
> 
>  8736                     os.popen(
>  8737                         self.rar + ' x "' + src_path + '" "' + dst_path 
> +       '"')
> 
> 
>  9171         os.popen(self.jpegtran + ' -copy all -trim ' + operation +
>  9172             ' -outfile "' + self.file[self.file_number] + '" "' +
>  9173             self.file[self.file_number] + '"')
> 
> This all bombs out when faced with file or directory names that contain
> the double quote character (") or a backslash.

Confirmed this issue, requesting a CVE id for this.

Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgprrSGGQexWA.pgp
Description: PGP signature

Reply via email to