Hi hhaamu,
* [EMAIL PROTECTED] <[EMAIL PROTECTED]> [2008-01-27 20:37]:
> Comix uses insufficient shell escaping when calling external programs
> (rar/unrar, jpegtran)
>
>
> 6280 files = \
> 6281 os.popen(self.rar + ' vb "' + path +
> 6282 '"').readlines()
>
>
> 6305 os.popen(self.rar + ' p -inul -- "' + path
> + '" "' +
> 6306 cover + '" > "' + thumb_dir +
> 6307 '/temp" 2>/dev/null', "r").close()
>
>
> 8736 os.popen(
> 8737 self.rar + ' x "' + src_path + '" "' + dst_path
> + '"')
>
>
> 9171 os.popen(self.jpegtran + ' -copy all -trim ' + operation +
> 9172 ' -outfile "' + self.file[self.file_number] + '" "' +
> 9173 self.file[self.file_number] + '"')
>
> This all bombs out when faced with file or directory names that contain
> the double quote character (") or a backslash.Confirmed this issue, requesting a CVE id for this. Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpRvwNrN4osF.pgp
Description: PGP signature

