Fixed Arbitary Code Execution Bug in Konsave#2
Fixed Arbitary Code Execution Bug in Konsave#2Anon-Artist wants to merge 1 commit into418sec:masterfrom
Conversation
|
👋 Hello, @Prayag2. @Anon-Artist has opened a PR to us with a fix for a potential vulnerability in your repository. To view the vulnerability, please refer to the bounty URL in the first comment, above. If you want this fix in your repository, a PR will automatically open once you comment:
|
|
@Prayag2 If you are interested on the fix please comment. 💯 @huntr-helper - LGTM |
|
Thanks @Prayag2 for fixing the bug yourself Here is the changelog |
|
No, it is me who should thank you for letting me know about this vulnerability! Thank you so much! |
|
@Anon-Artist - thanks for the heads up! 👋 We will reward you for the disclosure bounty in this instance - great work all! I have updated our database to reflect this valid vulnerability + the disclosure bounty reward. Cheers! 🍰 |
📊 Metadata *
konsaveis a CLI program that will let you save and apply your KDE Plasma customizations with just one command , which is vulnerable toArbitary Code Execution.Bounty URL: https://www.huntr.dev/bounties/1-pypi-Konsave
⚙️ Description *
Vulnerable to YAML deserialization attack caused by unsafe loading.
💻 Technical Description *
Fixed by avoiding unsafe loader.
🐛 Proof of Concept (PoC) *
Installation
Copy conf.yaml to konsave directory
conf.yaml
Then run the command below
konsave -s testThis will create a profile along with it code execution will occur
xcalc will pop up.
🔥 Proof of Fix (PoF) *
After fix Arbitary Code Execution will never happen.
👍 User Acceptance Testing (UAT)
After fix functionality is unaffected.
🔗 Relates to...
https://nvd.nist.gov/vuln/detail/CVE-2021-27213
https://snyk.io/vuln/SNYK-PYTHON-QLIB-1054635