Title: Remote command injection in Screen Capture v0.0.0

Author: Larry W. Cashdollar, @_larry0

Description: captures screenshots of web pages

Download: http://rubygems.org/gems/screen_capture

Vulnerability: This gem used via command line could have commands injected via the un-sanitized variables being passed to command line. if this gem is used in the context of a rails application a malicious user could inject commands by specially crafted input.

from screen_capture/blob/master/lib/screen_capture.rb: 1 class ScreenCapture
2 def self.capture(url, file, width=1024, height=800) 3 script = RUBY_PLATFORM =~ /darwin/ ? 'phantomjs' : 'phantomx11' 4 command = "#{script} #{File.expand_path(File.dirname(__FILE__)+'/..')}/src/screen_capture.js #{url} #{file} #{width} #{height}" 5 puts "Executing: {command}"
6 value = `
{command}`
7 puts "Command: #{value}"
8 end
9 end