OS Command Injection in KDE Frameworks - CVE-2019-14744
Published: August 7, 2019 / Updated: August 7, 2019
KDE Frameworks
KDE.org
Description
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation when processing .desktop and .directory files within the KConfigGroup::readEntry() function. A remote attacker can create a specially crafted file or folder, trick the user into opening it and execute arbitrary OS commands with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Examples:
1) payload.desktop
[Desktop Entry]
Icon[$e]=$(echo${IFS}0>~/Desktop/zero.lol&)
2) .directory
[Desktop Entry]
Type=Directory
Icon[$e]=$(echo${IFS}0>~/Desktop/zero.lol&)