Back In Time: Command injection

2018-01-07T00:00:00
ID GLSA-201801-06
Type gentoo
Reporter Gentoo Foundation
Modified 2018-01-07T00:00:00

Description

Background

A simple backup tool for Linux, inspired by “flyback project”.

Description

‘Back in Time’ did improper escaping/quoting of file paths used as arguments to the ‘notify-send’ command leading to some parts of file paths being executed as shell commands within an os.system call.

Impact

A context-dependent attacker could execute arbitrary shell commands via a specially crafted file.

Workaround

There is no known workaround at this time.

Resolution

All ‘Back In Time’ users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-backup/backintime-1.1.24"