"Knut Petersen" <[email protected]> writes:

>> We also have to inspect every other use of scm_system,
> e.g. backend_library.scm .If someone offers to run lilypond on a
> server, a similar attack might be (probably is) possible.
>
> Converting to pdf looks pretty save to me. 
>
> We do filter characters in  \bookOutputSuffix, but something like
>
> ~~~
> \version "2.21.0"
> \book {
>     #(set! (paper-variable #f 'output-filename) 
>     "/home/knut/\"&xterm -e find ~&" ) {c}
> }
> ~~~
>
> is allowed. But converting to pdf does use ly:system, and that in the
> end translates to a call of glibs g_spawn_sync that uses execve. So we
> really produce the file /home/knut/"&xterm -e find ~&.pdf here and do
> not execute anything but ghostscript.

Assuming that exec works fine enough on Windows for this (I think
Windows has to direct everything through a single-string command line).
But if it doesn't, we can call it "somebody else's problem" I presume.
Likely that of our cross compilation C standard library.

-- 
David Kastrup


---

** [issues:#5243] Fix security problem in lilypond-invoke-editor**

**Status:** Started
**Created:** Thu Nov 23, 2017 08:35 AM UTC by Knut Petersen
**Last Updated:** Fri Nov 24, 2017 09:57 PM UTC
**Owner:** Knut Petersen


Fix security problem in lilypond-invoke-editor

If lilypond-invoke-editor was installed as a general
uri-helper it was easy to abuse it to execute arbitrary
code on an attacked system for non-textedit URIs.
This part of the problem was discovered and reported
to our bug-lilypond mailing list by Gabriel Corona.

But also pure textedit URIs were vulnerable, an
example is the URI

textedit:///:&xterm -e find ~/&:x: 

that executes "find ~/" in a xterm. 

With this patch lilypond-invoke-editor only
handles textedit URIs, and it does no longer 
use the systems command processor but
guiles system* procedure for those URIs. 

Also the script will abort if the line, char and
column fields of a textedit URI contain anything
but digits.

We could have fixed URI passing to the browser,
but it is not our job to provide a general URI helper.
Other software (e.g. xdg-open and friends) should
be used for that. 

The security problem fixed now was introduced
into lilypond in the year 2005.

Signed-off-by: Knut Petersen <[email protected]>

http://codereview.appspot.com/336240043


---

Sent from sourceforge.net because [email protected] is 
subscribed to https://sourceforge.net/p/testlilyissues/issues/

To unsubscribe from further messages, a project admin can change settings at 
https://sourceforge.net/p/testlilyissues/admin/issues/options.  Or, if this is 
a mailing list, you can unsubscribe from the mailing list.
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Testlilyissues-auto mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/testlilyissues-auto
  • [Lilypond-... Auto mailings of changes to Lily Issues via Testlilyissues-auto
    • [Lily... Auto mailings of changes to Lily Issues via Testlilyissues-auto
    • [Lily... Auto mailings of changes to Lily Issues via Testlilyissues-auto
    • [Lily... Auto mailings of changes to Lily Issues via Testlilyissues-auto
    • [Lily... Auto mailings of changes to Lily Issues via Testlilyissues-auto
    • [Lily... Auto mailings of changes to Lily Issues via Testlilyissues-auto
    • [Lily... Auto mailings of changes to Lily Issues via Testlilyissues-auto
    • [Lily... Auto mailings of changes to Lily Issues via Testlilyissues-auto

Reply via email to