Wow Bernd! :) You're doing a really awesome review!! I'll be in paranoiac mode on and I'll check all the parameters. Please, take a look to the path :) Thanks in advance!
** Attachment removed: "Patchs for Ubuntu 14.04 & 14.10" https://bugs.launchpad.net/gui-ufw/+bug/1410839/+attachment/4300755/+files/patchs.tar.gz ** Attachment added: "patchs.tar.gz" https://bugs.launchpad.net/gui-ufw/+bug/1410839/+attachment/4303305/+files/patchs.tar.gz -- You received this bug notification because you are a member of Gufw Developers, which is subscribed to Gufw. https://bugs.launchpad.net/bugs/1410839 Title: Shell Command injection in ufw_backend.py Status in Gufw: In Progress Status in gui-ufw package in Ubuntu: Confirmed Bug description: Firewall Administrators can be tricked by someone to export a profile with Gufw to an special crafted file or path name wich contains shell code. reason is this line in ufw_backend.py : def export_profile(self, profile, file): commands.getstatusoutput('cp /etc/gufw/' + profile + '.profile ' + file + ' ; chmod 777 ' + file) The rename and delete funktions are also unsave if profile name contains shell code, like semicolons. To manage notifications about this bug go to: https://bugs.launchpad.net/gui-ufw/+bug/1410839/+subscriptions _______________________________________________ Mailing list: https://launchpad.net/~gufw-developers Post to : gufw-developers@lists.launchpad.net Unsubscribe : https://launchpad.net/~gufw-developers More help : https://help.launchpad.net/ListHelp