Bug 97462 - xpdf can execute shell code in malicious external hyperlink
Summary: xpdf can execute shell code in malicious external hyperlink
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: xpdf
Version: 9
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Than Ngo
QA Contact: Mike McLean
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2003-06-16 11:32 UTC by Ronny Buchmann
Modified: 2007-04-18 16:54 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2003-06-16 13:34:56 UTC
Embargoed:


Attachments (Terms of Use)
fixed xpdf-1.00-redhat.patch (7.53 KB, patch)
2003-06-16 13:00 UTC, Ronny Buchmann
no flags Details | Diff

Description Ronny Buchmann 2003-06-16 11:32:44 UTC
Description of problem:
xpdf can execute shell code in malicious external hyperlinks

Version-Release number of selected component (if applicable):
i assume bug exists in all xpdf versions shipped with rhl releases

How reproducible:
always

pdflatex xpdf-url-run.tex
xpdf 

Steps to Reproduce:
1. pdflatex the file below
----
\documentclass{article}
\usepackage[urlcolor=blue,colorlinks=true,pdfpagemode=none,pdfstartview=FitH]{hyperref}
\begin{document}
\href{test`touch
^^24HOME/generated_through_xpdf`}{\texttt{test}}
\end{document}
----
2. open it with xpdf
3. click the link, the file $HOME/generated_through_xpdf is generated
    
Proposed Fix:
change the xpdf-1.00-redhat.patch to call "htmlview '%s'" as urlCommand (single
quotes added)

also useful as a temporary workaround for system adminstrators (affected file is
/etc/xpdfrc)

Additional Info:
see http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html

Comment 1 Ronny Buchmann 2003-06-16 13:00:50 UTC
Created attachment 92424 [details]
fixed xpdf-1.00-redhat.patch

Comment 2 Than Ngo 2003-06-16 13:34:56 UTC
i have fixed this bug two week ago. I hope it will be pushed as errata this week.

Thanks for your report.


Note You need to log in before you can comment on or make changes to this bug.