Bug 7178

Summary: Pine: expanding env vars in URLs (from Bugtraq)
Product: [Retired] Red Hat Linux Reporter: peterw
Component: pineAssignee: Mike A. Harris <mharris>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 6.1Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
URL: http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-11-15&msg=Pine.LNX.4.10.9911171818220.12375-100000@ray.compu-aid.com
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2000-02-03 18:37:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description peterw 1999-11-20 16:21:51 UTC
Pine automatically recognizes URL's in plaintext messages and makes them
hyperlinks that can launch/spawn Web browsers, typically Lynx. If a user
receives an email with a hyperlink that contains a "$", in the process of
launching the Web browser, the apparent variable will be expanded. This can
be used to trick users into running arbitrary commands eith URL's like

http://localhost/#$(cp$IFS/dev/null$IFS/tmp/phackp)

(which requests "http://localhost/" and executes "cp /dev/null
/tmp/phackp")

This has been verified with pine-4.10-3 from Red Hat 6.1 (i386).

According to the bugtraq post, newer versions of Pine have fixed this
problem.

-Peter

Comment 1 Elliot Lee 2000-02-03 18:37:59 UTC
*** This bug has been marked as a duplicate of 3782 ***