[Bug 1694007] Re: externalcommand.py : Shell injection with a Path name

2017-05-31 Thread Bernd Dietzel
As you can see above, help() does not show the help of program abc but runs a shell command in the middle of the path and the path gets broken. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1694007

[Bug 1694007] Re: externalcommand.py : Shell injection with a Path name

2017-05-27 Thread Bernd Dietzel
Screenshot ** Attachment added: "Screenshot" https://bugs.launchpad.net/ubuntu/+source/bzr/+bug/1694007/+attachment/4884537/+files/screenshot.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1694007] [NEW] externalcommand.py : Shell injection with a Path name

2017-05-27 Thread Bernd Dietzel
Public bug reported: If inside the path is a shell command, it will be executed. In this demo the program xeyes will start but should not : ~ $ python Python 2.7.12 (default, Nov 19 2016, 06:48:10) [GCC 5.4.0 20160609] on linux2 Type "help", "copyright", "credits" or "license" for more

[Bug 1586514] Re: Shell Injection / filename

2017-02-19 Thread Bernd Dietzel
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1586514 Title: Shell Injection / filename To manage notifications about this bug

[Bug 1598438] [NEW] dialog.pl allows to inject shell code

2016-07-02 Thread Bernd Dietzel
Public bug reported: File : /usr/share/perl5/dialog.pl Line 25, 42, 62, 77 : system("dialog --title \"$title\" --textbox $file $height $width"); The perl script "dialog.pl" uses the system() command. So shell code in a path and/or file name could be executed. For Example like in this perl demo

[Bug 1513964] Re: dsextras.py : Shell Command Injection with a pkg name

2016-05-28 Thread Bernd Dietzel
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1513964 Title: dsextras.py : Shell Command Injection with a pkg name To manage

[Bug 1586346] Re: Shell injection with a GTK-Bookmark

2016-05-27 Thread Bernd Dietzel
** Attachment added: "recent.py has the same problem / Screenshot" https://bugs.launchpad.net/ubuntu/+source/mate-menu/+bug/1586346/+attachment/4671530/+files/Screenshot%20recent.py%20%20bug.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1586346] Re: Shell injection with a GTK-Bookmark

2016-05-27 Thread Bernd Dietzel
...and Remove this os.system calls, too please :-) /usr/share/mate-menu/plugins/recent.py:189: x = os.system("gvfs-open \""+filename+"\"") /usr/share/mate-menu/plugins/applications.py:991: os.system("rm \"%s\" &" % desktopEntry.desktopFile)

[Bug 1586346] [NEW] Shell injection with a GTK-Bookmark

2016-05-27 Thread Bernd Dietzel
Public bug reported: Shell Commands can be injected when the file ~/.gtk-bookmarks contains for example a path like this : /temp/$(xeyes)/test/ In the settings of the mate-menu the option to show the gtk-bookmarks in the places must be checked to make it work. See attached screenshot. Reason

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2016-05-17 Thread Bernd Dietzel
OK, check this new patch for the audacious scope. - No injections - Multiple Tracks - Database issues ** Attachment added: "new audacious patch - multiple tracks + database"

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2016-05-16 Thread Bernd Dietzel
@Seth , you Comment 17 : I had a look on audacious the db-file access : for collection in os.listdir(AUDACIOUS_DBFILE): dbfile = '%s/%s' % (AUDACIOUS_DBFILE, collection) database = open(dbfile, "r") database = database.read() if not

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2016-05-15 Thread Bernd Dietzel
New patch for unity_audacious_daemon.py with better handling of multiple tracks ** Attachment added: "audacious patch - multiple tracks"

[Bug 1550676] Re: analyze_suspend.py may allow shell code injection

2016-04-16 Thread Bernd Dietzel
** Attachment removed: "WifiSyslog.txt" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1550676/+attachment/4582509/+files/WifiSyslog.txt ** Attachment removed: "UdevDb.txt" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1550676/+attachment/4582508/+files/UdevDb.txt **

[Bug 1550653] [NEW] platform.py uses os.popen command

2016-02-26 Thread Bernd Dietzel
Public bug reported: Uses depreached os.popen command. Shell Code can be injected, see example below. Replace it with subprocess please. file : /usr/lib/python3.5/platform.py line 416: return os.popen(cmd, mode, bufsize) Example which starts the program xeyes but should not : ~$ python

[Bug 1545527] [NEW] Shell Injection with a custom panel layout

2016-02-14 Thread Bernd Dietzel
Public bug reported: line 360-361 : cmd = 'dconf load /org/mate/panel/ < /usr/share/mate-panel/layouts/' + new_layout + '.panel' os.system(cmd) If the file name of a layout contains shell commands, they may be executed by os.system. Replace os.system with subprocess please. Thank you :-) **

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2016-01-01 Thread Bernd Dietzel
For a Shotwell Scope SQL injection Demo , i attached a screenshot. Code can be injected with a file name in the function getPhotoForUri. Demonstration: a) rename some picture like this xx " UNION SELECT

[Bug 1514046] Re: Shell command injection - samba-tool domain classicupgrade

2015-12-28 Thread Bernd Dietzel
public in upstream https://bugzilla.samba.org/show_bug.cgi?id=11601#c7 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu.

[Bug 1514046] Re: Shell command injection - samba-tool domain classicupgrade

2015-12-28 Thread Bernd Dietzel
public in upstream https://bugzilla.samba.org/show_bug.cgi?id=11601#c7 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1514046

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2015-12-20 Thread Bernd Dietzel
@David shotwell , firefoxbookmarks, chromiumbookmarks and zotero scope may be checked for sql injections, too. Example : Some code of the shotwell scope : sql='select * from PhotoTable where filename = \"'+filename+'\"' -- You received this bug notification because you are a member of Ubuntu

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2015-12-19 Thread Bernd Dietzel
My new Clementine Patch. I had a look on the other patches to fix the SQL injections. Fixed utf8 decoding to crash with try and except. Hope it works. Please test. ** Attachment added: "clementine patch , Shell Injections + SQL Injections + UTF8 Crash"

[Bug 1512068] Re: Python ctypes.util , Shell Injection in find_library()

2015-11-28 Thread Bernd Dietzel
Seens the bug is already known and fixed since 2014 but found not its way to ubuntu repos. http://bugs.python.org/issue22636 ** Information type changed from Private Security to Public Security ** Bug watch added: Python Roundup #22636 http://bugs.python.org/issue22636 -- You received

[Bug 1507025] Re: Shell Command Injection with the hostname

2015-11-25 Thread Bernd Dietzel
@Marc Yes , if some application has a bug , for example MintNanny : https://bugs.launchpad.net/linuxmint/+bug/1460835 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1507025 Title: Shell Command

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2015-11-15 Thread Bernd Dietzel
@David Did you noticed that the albumtracks are a list and not a simple string ? Have a look on my "Better patch for unity_clementine_daemon.py" on comment #10 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1514183] Re: distutils : file "bdist_rpm.py" allows Shell injection in "name"

2015-11-14 Thread Bernd Dietzel
Reported to Upstream : http://bugs.python.org/issue25627 ** Bug watch added: Python Roundup #25627 http://bugs.python.org/issue25627 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1514183 Title:

[Bug 1514183] Re: distutils : file "bdist_rpm.py" allows Shell injection in "name"

2015-11-12 Thread Bernd Dietzel
Hello Tyler, i only used the setup script because the distutils.core.setup() function takes such a large number of arguments, so its more easy to read than in one single line of code. No, i haven't reported this issue to upstream. -- You received this bug notification because you are a

[Bug 1514183] [NEW] distutils : file "bdist_rpm.py" allows Shell injection in "name"

2015-11-08 Thread Bernd Dietzel
*** This bug is a security vulnerability *** Public security bug reported: File : /usr/lib/python2.7/distutils/command/bdist_rpm.py Line 358 : This line in the code uses the depreached os.popen command, should be replaced with subprocess.Popen() : out = os.popen(q_cmd) Exploit demo :

[Bug 1512068] [NEW] Python ctypes.util , Shell Injection in find_library()

2015-11-01 Thread Bernd Dietzel
Public bug reported: https://github.com/Legrandin/ctypes/issues/1 The find_library() function can execute code when special chars like ;|`<>$ are in the name. The "os.popen()" calls in the util.py script should be replaced with "subprocess.Popen()". Demo Exploits for Linux :

[Bug 1509835] Re: Possible Shell Command Injection

2015-10-31 Thread Bernd Dietzel
my demo exploit video (german) https://www.youtube.com/watch?v=QGAjwKF5d3w -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1509835 Title: Possible Shell Command Injection To manage notifications

[Bug 1509835] Re: Possible Shell Command Injection

2015-10-31 Thread Bernd Dietzel
My improved Patch Nr. 2 ** Patch added: "This patch can split the opts string and has a stdout and a stderr" https://bugs.launchpad.net/ubuntu/+source/apt-offline/+bug/1509835/+attachment/4509935/+files/Patch2.diff -- You received this bug notification because you are a member of Ubuntu

[Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-31 Thread Bernd Dietzel
#! /bin/sh # run this as root early in the boot order. No other script like hostname.sh should run later HOSTNAME="$(hostname|sed 's/[^A-Za-z0-9_\-\.]/x/g')";hostname "$HOSTNAME" -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-31 Thread Bernd Dietzel
script ** Attachment added: "changehostname.sh" https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1507025/+attachment/4510099/+files/changehostname.sh -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1509835] Re: Possible Shell Command Injection

2015-10-30 Thread Bernd Dietzel
My patch was accepted by Mr. Sarraf and fixed in apt-offline upstream repo. https://github.com/rickysarraf/apt-offline/blob/master/apt_offline_core/AptOfflineCoreLib.py -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1510317] Re: Shell Command Injection in "Mailcap" file handling

2015-10-29 Thread Bernd Dietzel
I have reported it to upstream : http://bugs.python.org/issue24778 I have uploaded my patches to upstream: http://bugs.python.org/file40897/mailcap%20patch.zip ** Bug watch added: Python Roundup #24778 http://bugs.python.org/issue24778 -- You received this bug notification because you are a

[Bug 1510317] Re: Shell Command Injection in "Mailcap" file handling

2015-10-28 Thread Bernd Dietzel
I fixed a typo and make code shorter. New patch attached. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1510317 Title: Shell Command Injection in "Mailcap" file handling To manage notifications

[Bug 1510317] Re: Shell Command Injection in "Mailcap" file handling

2015-10-28 Thread Bernd Dietzel
** Patch added: "Patch for mailcap.py (pyhon 2.7)" https://bugs.launchpad.net/ubuntu/+source/python3.5/+bug/1510317/+attachment/4507759/+files/PatchForMailCap.diff ** Attachment removed: "mailcap.py without shell injections"

[Bug 1510317] Re: Shell Command Injection in "Mailcap" file handling

2015-10-27 Thread Bernd Dietzel
My "Idea" for a quick bugfix : Inside the mailcap.py script, we copy the file to temp and give the file an random name like this ... /temp/.tmp ... and then resulting with the random name instead of the original name. -- You received this bug notification because you are a member of Ubuntu

[Bug 1510317] Re: Shell Command Injection in "Mailcap" file handling

2015-10-27 Thread Bernd Dietzel
My patch. 1) I removed the os.system() calls and append a new function "run" witch uses subprocess. 2) "Subst" function now uses quote() and is returning a list, not a string. So it can be passed to subprocess. 3) If you do not want to get back a command "string" but a command [list] , you can

[Bug 1510317] [NEW] Shell Command Injection in "Mailcap" file handling

2015-10-26 Thread Bernd Dietzel
*** This bug is a security vulnerability *** Public security bug reported: https://docs.python.org/2/library/mailcap.html mailcap.findmatch(caps, MIMEtype[, key[, filename[, plist]]]) Return a 2-tuple; the first element is a string containing the command line to be executed (which can be passed

[Bug 1510317] Re: Shell Command Injection in "Mailcap" file handling

2015-10-26 Thread Bernd Dietzel
** Description changed: https://docs.python.org/2/library/mailcap.html mailcap.findmatch(caps, MIMEtype[, key[, filename[, plist]]]) Return a 2-tuple; the first element is a string containing the command line to be executed (which can be passed to os.system()), ... Security Bug in

[Bug 1509835] Re: Possible Shell Command Injection

2015-10-26 Thread Bernd Dietzel
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1509835 Title: Possible Shell Command Injection To manage notifications about this bug go

[Bug 1467666] Re: speechd_config executes Shell Commands

2015-10-25 Thread Bernd Dietzel
Patch ** Patch added: "Patch for /usr/lib/python3/dist-packages/speechd_config/config.py" https://bugs.launchpad.net/ubuntu/+source/speech-dispatcher/+bug/1467666/+attachment/4504591/+files/Patch.diff -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1466633] Re: Pluma Plugin "Snippets" Manager - Shell Command Injection

2015-10-25 Thread Bernd Dietzel
I attached a patch witch solves the problem. I have tested it with gedit 3.10.4 and Ubuntu 15.10 Should be the same in pluma. ** Patch added: "Patch for gedit importer.py" https://bugs.launchpad.net/gedit/+bug/1466633/+attachment/4504703/+files/importer.py_Patch.diff -- You received this

[Bug 1509835] [NEW] Possible Shell Command Injection

2015-10-25 Thread Bernd Dietzel
Public bug reported: Because of this os.system call in AptOfflineCoreLib.py x = os.system("%s %s %s %s" % (self.gpgv, self.opts, signature_file, signed_file) ) the python script is vulnerable to shell command injections in 4 ways. 1. if there is a shell command in the path, for example

[Bug 1506823] Re: Shell Command Injection with a picture

2015-10-24 Thread Bernd Dietzel
Patch to fix the shell command injection pitivi Version 0.94 ** Patch added: "patch for mainwindow.py , pitivi Version 0.94" https://bugs.launchpad.net/ubuntu/+source/pitivi/+bug/1506823/+attachment/4504236/+files/mainwindow.py.diff -- You received this bug notification because you are a

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2015-10-23 Thread Bernd Dietzel
Better patch attached for the clementine unity scope Python script. 1) I use subprocess.Popen() this time instead of the simple subprocess.call() before. 2) Should now handle albumtracks in a better way because its a list of strings. 3) Clementime gives you now a error message on playing a

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2015-10-22 Thread Bernd Dietzel
I attached a patch for unity_clementine_daemon.py wich should solve the problem using subprocess ** Patch added: "unity_clementine_daemon_patch.diff" https://bugs.launchpad.net/ubuntu/+source/unity-scope-clementine/+bug/1483037/+attachment/4502656/+files/unity_clementine_daemon_patch.diff --

[Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-19 Thread Bernd Dietzel
Workaround ... to make my modified "hostname.sh" script run at startup, i changed the file /etc/rc.local #!/bin/sh -e # # rc.local # # This script is executed at the end of each multiuser runlevel. # Make sure that the script will "exit 0" on success or any other # value on error. # # In order

[Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-18 Thread Bernd Dietzel
Thats better ... (the "-" was wrong in my previous posting ) HOSTNAME="${HOSTNAME//[^A-Za-z0-9_\-]/x}" i attached a modified hostname.sh wich uses bash. it can be startet manualy with sudo /etc/init.d/hostname.sh start The command should somehow run at startup ... but does not by default ?

[Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-18 Thread Bernd Dietzel
Patch : HOSTNAME=${HOSTNAME//[^A-Za-z0-9-_]/_} -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1507025 Title: Shell Command Injection with the hostname To manage notifications about this bug go to:

[Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-17 Thread Bernd Dietzel
I agree, i think the hostname should be in the hands of the kernel only. Should not be overwritten by /etc/hostname.sh. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1507025 Title: Shell Command

[Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-17 Thread Bernd Dietzel
typo ... the path is /etc/init.d/hostname.sh -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1507025 Title: Shell Command Injection with the hostname To manage notifications about this bug go to:

[Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-17 Thread Bernd Dietzel
german demo video https://www.youtube.com/watch?v=qYuVzHsklS8 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1507025 Title: Shell Command Injection with the hostname To manage notifications about

[Bug 1506823] [NEW] Shell Command Injection with a picture

2015-10-16 Thread Bernd Dietzel
Public bug reported: mainwindow.py , Line 486 os.system('xdg-open "%s"' % path_from_uri(asset.get_id())) If you import an image and double click on it to see a preview , any shell command in the picture name will be executet. For example : 1) rename a picture to this name $(xmessage hello

[Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-16 Thread Bernd Dietzel
** Attachment removed: "Dependencies.txt" https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1507025/+attachment/4497264/+files/Dependencies.txt ** Attachment removed: "JournalErrors.txt"

[Bug 1460413] Re: Shell Command Injection in logcapture.py

2015-10-03 Thread Bernd Dietzel
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1460413 Title: Shell Command Injection in logcapture.py To manage notifications

[Bug 1410839] Re: Shell Command injection in ufw_backend.py

2015-10-03 Thread Bernd Dietzel
fix works. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1410839 Title: Shell Command injection in ufw_backend.py To manage notifications about this bug go to:

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2015-08-30 Thread Bernd Dietzel
If the shell command can be injected seems only depend on how the Musikplayers store their data. The Gmusicbrowser Unity Scope seems to be lucky because the gmusicbrowser player changes special chars in the name before it stores it in his database. The Audacious Scope and Clementine Scope are

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2015-08-14 Thread Bernd Dietzel
Exploid Demo Video (german) https://www.youtube.com/watch?v=JrP7B6CIOMQ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1483037 Title: Possible Shell Command Injection in daemon To manage

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2015-08-10 Thread Bernd Dietzel
I attached a Clementine Scope Exploid Screenshot Demo ** Attachment added: exploid scope clementine https://bugs.launchpad.net/ubuntu/+source/unity-scope-gmusicbrowser/+bug/1483037/+attachment/4442436/+files/Clementine%20Scope%20Exploid%20Screenshot.png -- You received this bug

[Bug 1483037] [NEW] Possible Shell Comand Injection in deamon

2015-08-09 Thread Bernd Dietzel
Public bug reported: File : /usr/share/unity-scopes/gmusicbrowser/unity_gmusicbrowser_daemon.py Function do_activate is vulnerable to Shell Commands in the filename of the tracks, the dirname of the album and the albumtracks. os.system(xdg-open '%s' % str(dirname)) ##Example : xterm starts

[Bug 1483037] Re: Possible Shell Comand Injection in deamon

2015-08-09 Thread Bernd Dietzel
Same issues in : /usr/share/unity-scopes/audacious/unity_audacious_daemon.py /usr/share/unity-scopes/guayadeque/unity_guayadeque_daemon.py /usr/share/unity-scopes/clementine/unity_clementine_daemon.py /usr/share/unity-scopes/musique/unity_musique_daemon.py -- You received this bug notification

[Bug 1483037] Re: Possible Shell Command Injection in daemon

2015-08-09 Thread Bernd Dietzel
** Summary changed: - Possible Shell Comand Injection in deamon + Possible Shell Command Injection in daemon -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1483037 Title: Possible Shell Command

[Bug 1467666] Re: speechd_config executes Shell Commands

2015-06-30 Thread Bernd Dietzel
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1467666 Title: speechd_config executes Shell Commands To manage notifications about this

[Bug 1466633] Re: Pluma Plugin Snippets Manager - Shell Command Injection

2015-06-30 Thread Bernd Dietzel
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1466633 Title: Pluma Plugin Snippets Manager - Shell Command Injection To manage

[Bug 1462470] Re: pydoc.py uses old netscape navigator

2015-06-30 Thread Bernd Dietzel
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1462470 Title: pydoc.py uses old netscape navigator To manage notifications about this bug

[Bug 1460403] Re: Shell Command Injection in cmyk-tiff-2-cmyk-pdf.py

2015-06-30 Thread Bernd Dietzel
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1460403 Title: Shell Command Injection in cmyk-tiff-2-cmyk-pdf.py To manage notifications

[Bug 1467666] [NEW] speechd_config executes Shell Commands

2015-06-22 Thread Bernd Dietzel
Public bug reported: if espeak is installed , some functions in the script speechd_config.py can be used to execute Shell Commands. -- Demo Example from the terminal type in : theregrunner@mint17 : ~ $ python3 Python 3.4.0 (default, Apr 11 2014, 13:05:18) [GCC 4.8.2] on linux Type help,

[Bug 1466633] Re: Pluma Plugin Snippets Manager - Shell Command Injection

2015-06-21 Thread Bernd Dietzel
Same problem with gedit 2.30.4 in Linux Mint 17.1 Rebecca Watch my (german) Shell Command Injection Demo Video at Timecode 10:00min https://www.youtube.com/watch?v=abP76r-2js0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1466633] [NEW] Pluma Plugin Snippets Manager - Shell Command Injection

2015-06-18 Thread Bernd Dietzel
Public bug reported: The Plugin Snippets in Pluma 1.8.1 is vulnerabe to Shell Commands. If you activate the snippet Plugin , you can use tools - manage snippets from the main menu of pluma. Example : If you import a snippet with the manager wich has a filename like this :

[Bug 1462470] [NEW] pydoc.py uses old netscape navigator

2015-06-05 Thread Bernd Dietzel
Public bug reported: File : /usr/lib/python2.7/pydoc.py line : 2216 ... 2226 pydoc.py uses old netscape navigator when the webbrowser module can not be imported: And it is vulnerable to shell command injection too, because it uses os.system() wich allows shell commands in the parameter url.

[Bug 1410839] Re: Shell Command injection in ufw_backend.py

2015-01-21 Thread Bernd Dietzel
Ok, the parameters are filtered now. I'd still like to see subprocess.Popen() in combination with it's Parameter shell=False in the code. Please, do not use commands.getstatusoutput() , its unsave when there are arguments in the string wich the attacker can reach. Subprocess.Popen() directs the

[Bug 1410839] Re: Shell Command injection in ufw_backend.py

2015-01-20 Thread Bernd Dietzel
I was able to use iface to insert a shell command, too. 1.) save a profile wich uses some interface , for example eth0 to your home directory. 2.) edit the file like this iface = eth0;xterm; 3.) rename the profile to some other name than before 4.) import the new profile with Gufw from your

[Bug 1410839] Re: Shell Command injection in ufw_backend.py

2015-01-19 Thread Bernd Dietzel
It was an honor to help you :-) Maybe it would be an good idea to think about 'quoting' each and every parameter before it's passed to command ? https://docs.python.org/3/library/shlex.html#shlex.quote with best reagrds Bernd -- You received this bug notification because you are a member of

[Bug 1410839] Re: Shell Command injection in ufw_backend.py

2015-01-18 Thread Bernd Dietzel
Interessiting. One thing leads to an other thing :-) If its get's worse you may wan't to think about going back and using subprocess.popen() instead of the old commands.getstatusoutput() This could make the code shorter. -- You received this bug notification because you are a member of Ubuntu

[Bug 877631] Re: AssertionError after interruption/restart of backup

2011-11-08 Thread Bernd Dietzel
i am using deja-dup 20.1-0ubuntu0.2 (oneiric-proposed) to fix the problem , but the bug is śtill there i am using ubuntu 11.10 32 bit with german Language (de) i had used a password for encryption ( letters a-z , 0-9, and special char - ) i choose to keep the password i choose to keep the

[Bug 711561] Re: Compiz won't allow Desktop Cube plugin to load with unity

2011-03-13 Thread Bernd Dietzel
i got the cube running with wall and unity on the compiz config settings manager (ccsm) disable auto sort plugins add cube and so on manualy the unity plugin has to be more at the end than the cube the wall has to be above the cube start the gnome-panel from a terminal, set 4 Desktops in one row

[Bug 731451] [NEW] audacity not working in Ubuntu 11.04 Alpha3

2011-03-08 Thread Bernd Dietzel
Public bug reported: Binary package hint: audacity Audacity Version : 1.13.12-14ubuntu1 Ubuntu Version : Ubuntu 11.04 Natty Narwhal Alpha3 , 64bit When Audacity starts the CPU usage raises high, even when not audio file has been opened yet. Then, when you try to open a audio file like a wave

[Bug 731451] Re: audacity not working in Ubuntu 11.04 Alpha3

2011-03-08 Thread Bernd Dietzel
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/731451 Title: audacity not working in Ubuntu 11.04 Alpha3 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com