desktop-packages team mailing list archive
-
desktop-packages team
-
Mailing list archive
-
Message #145552
[Bug 1506823] Re: Shell Command Injection with a picture
This bug was fixed in the package pitivi - 0.94-4ubuntu1
---------------
pitivi (0.94-4ubuntu1) xenial; urgency=medium
* d/patches/from_upstream_shell_command_injection.patch: apply upstream
commit to fix possible shell command injection. Thanks Bernd Dietzel for
bringing it up. (LP: #1506823)
-- Daniel Holbach <daniel.holbach@xxxxxxxxxx> Mon, 26 Oct 2015
09:52:09 +0100
** Changed in: pitivi (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to pitivi in Ubuntu.
https://bugs.launchpad.net/bugs/1506823
Title:
Shell Command Injection with a picture
Status in pitivi package in Ubuntu:
Fix Released
Bug description:
mainwindow.py , Line 486
os.system('xdg-open "%s"' % path_from_uri(asset.get_id()))
If you import an image and double click on it to see a preview ,
any shell command in the picture name will be executet.
For example :
1) rename a picture to this name
$(xmessage hello world).png
2) import the picture
3) doubleclick on the picture entry in the media libary.
4) xmessage runs
So, please use subprocess, not os.system
screenshot attached
ProblemType: Bug
DistroRelease: Ubuntu 15.10
Package: pitivi 0.94-4
ProcVersionSignature: Ubuntu 4.2.0-15.18-generic 4.2.3
Uname: Linux 4.2.0-15-generic x86_64
ApportVersion: 2.19.1-0ubuntu2
Architecture: amd64
CurrentDesktop: Unity
Date: Fri Oct 16 12:16:05 2015
InstallationDate: Installed on 2015-10-09 (6 days ago)
InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Alpha amd64 (20151009)
SourcePackage: pitivi
UpgradeStatus: No upgrade log present (probably fresh install)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pitivi/+bug/1506823/+subscriptions
References