First published: Mon Jan 26 2009(Updated: )
Untrusted search path vulnerability in Epiphany's Python interface allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function. References: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504363">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504363</a> Test case available in: <a href="http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html">http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html</a> Proposed patch: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=sanitize_sys.path.diff;att=1;bug=504363">http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=sanitize_sys.path.diff;att=1;bug=504363</a> Patch notes: The path for affected file in Fedora is BUILD/epiphany-N.V.R/src/ephy-python.c, the proposed patch won't apply cleanly, but the change of: ++ /* Sanitize sys.path to prevent relative imports loading modules in ++ * the current working directory ++ */ ++ PyRun_SimpleString("import sys; sys.path = filter(None, sys.path)") in ephy-python.c should be enough to fix this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Epiphany | =2.22.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.