OS Command Injection in KDE Frameworks - CVE-2019-14744

 

OS Command Injection in KDE Frameworks - CVE-2019-14744

Published: August 7, 2019 / Updated: August 7, 2019


Vulnerability identifier: #VU19947
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2019-14744
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
KDE Frameworks
Software vendor:
KDE.org

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when processing .desktop and .directory files within the KConfigGroup::readEntry() function. A remote attacker can create a specially crafted file or folder, trick the user into opening it and execute arbitrary OS commands with privileges of the current user.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Examples:

1) payload.desktop

[Desktop Entry]
Icon[$e]=$(echo${IFS}0>~/Desktop/zero.lol&)

2) .directory

[Desktop Entry]
Type=Directory
Icon[$e]=$(echo${IFS}0>~/Desktop/zero.lol&)

Remediation

Update to version 5.61.0

External links