[Touch-packages] [Bug 1513964] Re: dsextras.py : Shell Command Injection with a pkg name

2016-05-28 Thread Bernd Dietzel
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to pygobject-2 in Ubuntu. https://bugs.launchpad.net/bugs/1513964 Title: dsextras.py : Shell Command Injecti

[Touch-packages] [Bug 1512068] Re: Python ctypes.util , Shell Injection in find_library()

2015-11-28 Thread Bernd Dietzel
Seens the bug is already known and fixed since 2014 but found not its way to ubuntu repos. http://bugs.python.org/issue22636 ** Information type changed from Private Security to Public Security ** Bug watch added: Python Roundup #22636 http://bugs.python.org/issue22636 -- You received this

[Touch-packages] [Bug 1507025] Re: Shell Command Injection with the hostname

2015-11-25 Thread Bernd Dietzel
@Marc Yes , if some application has a bug , for example MintNanny : https://bugs.launchpad.net/linuxmint/+bug/1460835 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to bash in Ubuntu. https://bugs.launchpad.net/bugs/1507025 Tit

[Touch-packages] [Bug 1514183] Re: distutils : file "bdist_rpm.py" allows Shell injection in "name"

2015-11-14 Thread Bernd Dietzel
Reported to Upstream : http://bugs.python.org/issue25627 ** Bug watch added: Python Roundup #25627 http://bugs.python.org/issue25627 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to python2.7 in Ubuntu. https://bugs.launchp

[Touch-packages] [Bug 1514183] Re: distutils : file "bdist_rpm.py" allows Shell injection in "name"

2015-11-12 Thread Bernd Dietzel
Hello Tyler, i only used the setup script because the distutils.core.setup() function takes such a large number of arguments, so its more easy to read than in one single line of code. No, i haven't reported this issue to upstream. -- You received this bug notification because you are a member

[Touch-packages] [Bug 1514183] [NEW] distutils : file "bdist_rpm.py" allows Shell injection in "name"

2015-11-08 Thread Bernd Dietzel
*** This bug is a security vulnerability *** Public security bug reported: File : /usr/lib/python2.7/distutils/command/bdist_rpm.py Line 358 : This line in the code uses the depreached os.popen command, should be replaced with subprocess.Popen() : out = os.popen(q_cmd) Exploit demo :

[Touch-packages] [Bug 1512068] [NEW] Python ctypes.util , Shell Injection in find_library()

2015-11-01 Thread Bernd Dietzel
Public bug reported: https://github.com/Legrandin/ctypes/issues/1 The find_library() function can execute code when special chars like ;|`<>$ are in the name. The "os.popen()" calls in the util.py script should be replaced with "subprocess.Popen()". Demo Exploits for Linux : ==

[Touch-packages] [Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-31 Thread Bernd Dietzel
#! /bin/sh # run this as root early in the boot order. No other script like hostname.sh should run later HOSTNAME="$(hostname|sed 's/[^A-Za-z0-9_\-\.]/x/g')";hostname "$HOSTNAME" -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed t

[Touch-packages] [Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-31 Thread Bernd Dietzel
script ** Attachment added: "changehostname.sh" https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1507025/+attachment/4510099/+files/changehostname.sh -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to bash in Ubuntu. http

[Touch-packages] [Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-19 Thread Bernd Dietzel
Workaround ... to make my modified "hostname.sh" script run at startup, i changed the file /etc/rc.local #!/bin/sh -e # # rc.local # # This script is executed at the end of each multiuser runlevel. # Make sure that the script will "exit 0" on success or any other # value on error. # # In order t

[Touch-packages] [Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-18 Thread Bernd Dietzel
Thats better ... (the "-" was wrong in my previous posting ) HOSTNAME="${HOSTNAME//[^A-Za-z0-9_\-]/x}" i attached a modified hostname.sh wich uses bash. it can be startet manualy with sudo /etc/init.d/hostname.sh start The command should somehow run at startup ... but does not by default ? *

[Touch-packages] [Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-18 Thread Bernd Dietzel
Patch : HOSTNAME=${HOSTNAME//[^A-Za-z0-9-_]/_} -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to bash in Ubuntu. https://bugs.launchpad.net/bugs/1507025 Title: Shell Command Injection with the hostname Status in bash packag

[Touch-packages] [Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-17 Thread Bernd Dietzel
german demo video https://www.youtube.com/watch?v=qYuVzHsklS8 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to bash in Ubuntu. https://bugs.launchpad.net/bugs/1507025 Title: Shell Command Injection with the hostname Status

[Touch-packages] [Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-17 Thread Bernd Dietzel
typo ... the path is /etc/init.d/hostname.sh -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to bash in Ubuntu. https://bugs.launchpad.net/bugs/1507025 Title: Shell Command Injection with the hostname Status in bash package

[Touch-packages] [Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-17 Thread Bernd Dietzel
I agree, i think the hostname should be in the hands of the kernel only. Should not be overwritten by /etc/hostname.sh. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to bash in Ubuntu. https://bugs.launchpad.net/bugs/1507025

[Touch-packages] [Bug 1507025] Re: Shell Command Injection with the hostname

2015-10-16 Thread Bernd Dietzel
** Attachment removed: "Dependencies.txt" https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1507025/+attachment/4497264/+files/Dependencies.txt ** Attachment removed: "JournalErrors.txt" https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1507025/+attachment/4497265/+files/JournalErrors.

[Touch-packages] [Bug 1462470] Re: pydoc.py uses old netscape navigator

2015-06-30 Thread Bernd Dietzel
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to python2.7 in Ubuntu. https://bugs.launchpad.net/bugs/1462470 Title: pydoc.py uses old netscape navigator Status in

[Touch-packages] [Bug 1462470] [NEW] pydoc.py uses old netscape navigator

2015-06-05 Thread Bernd Dietzel
Public bug reported: File : /usr/lib/python2.7/pydoc.py line : 2216 ... 2226 pydoc.py uses old netscape navigator when the webbrowser module can not be imported: And it is vulnerable to shell command injection too, because it uses os.system() wich allows shell commands in the parameter "url".