Bug 945638 (CVE-2015-0854) - VUL-0: CVE-2015-0854: shutter: Insecure use of system() in shutter
Summary: VUL-0: CVE-2015-0854: shutter: Insecure use of system() in shutter
Status: RESOLVED FIXED
Alias: CVE-2015-0854
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other All
: P4 - Low : Minor
Target Milestone: ---
Assignee: Matthias Mailänder
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/156543/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-09-14 08:43 UTC by Victor Pereira
Modified: 2021-09-08 09:02 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2015-09-14 08:43:11 UTC
CVE-2015-0854

In the "Shutter" screenshot application, I discovered that using the
"Show in folder" menu option while viewing a file with a
specially-crafted path allows for arbitrary code execution with the
permissions of the user running Shutter.

STEPS TO REPRODUCE:
     1. Put an image in a folder called "$(xeyes)"
     2. Open the image in Shutter
     3. Right-click the image and click "Show in Folder"

The `xeyes` program (if installed on your system) should start.

Lines  54+ of
share/shutter/resources/modules/Shutter/App/HelperFunctions.pm:
        sub xdg_open {
                my ( $self, $dialog, $link, $user_data ) = @_;
                system("xdg-open $link");
        }

Because `system` is used, the string is scanned for shell
metacharacters, and if found the string is executed using a shell.


References:
https://bugs.launchpad.net/shutter/+bug/1495163
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0854
http://seclists.org/oss-sec/2015/q3/541
Comment 1 Swamp Workflow Management 2015-09-14 22:00:14 UTC
bugbot adjusting priority
Comment 2 Johannes Segitz 2017-08-10 15:29:01 UTC
Still unfixed in current Leap, please submit
Comment 4 Matthias Mailänder 2021-09-08 09:02:08 UTC
Submissions have long been accepted.