-
Notifications
You must be signed in to change notification settings - Fork 578
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Guake 3.8.5 does not execute commands provided by --execute-command= #2061
Comments
Duplicate of #2042 |
Closing because duplicate, #2057 will reintroduce -e, but with different behavior. It will always create a new tab by default. I can technically force PRs through but this particular one I do want another maintainer's eyes on it to catch any way I may have accidentally reintroduced the vulnerability, although other maintainers check by fairly infrequently |
@Davidy22 with always a new tab breaks a lot of my scripts. I used the dbus execute_command to run things from vim to guake, like compilation etc Why is it so problematic to allow it under an option, so the user completely takes responsibility ? reintroducing it with always creating a new tab doesn't really solve much. It only solves the use case for startup scripts. |
-e that doesn't force a new tab had a demonstrable security vulnerability where a malicious program can execute commands with root privileges if the guake session has elevated privileges. The behavior is changed to force new tab creation, because new tabs don't have elevated privileges, unless someone comes up with another preferable scheme for resolving the vulnerability. |
is there a way to check whether the guake session actually has elevated privileges ? Or is this deadend, maybe I can come up with a PR, I desperately need this, it opens so many possibilities, it's all about automation and communication between different tools & Guake. |
It's something of a nebulous problem since the term "elevated privileges" can include things that don't strictly include being sudo, there's a gradient of possible privilege levels that can still be undesirable to leak and some amount of them can be tied to arbitrary locally defined groups, also terminals can also just give people root privileges without even being logged in as root temporarily because most people have it set to remember that they entered a sudo password in the last 15 minutes. If you have a scheme implemented for definitively determining that the target terminal is unescalated then we can reintroduce the old behavior without reintroducing the vulnerability |
Guake integration is not working anymore due to Guake/guake#2061 (comment)
@Davidy22 I was thinking that maybe we could include an Option that allows that in the Preferences, that also pinpoints on the security issues that such option has. Anyway, I ll find different ways to automate my flows, thanks for all the efforts in Guake, I have been using since 2010 and it has always been working great for me. |
If the user is aware of the risk and has to manually opt into the old behavior through a warning then I guess it could be fine. I am a little not too thrilled about intentionally reintroducing a known security flaw that users can opt into, is there no other workable option available for your script? If it's something to do with multiple consecutive commands, perhaps some amount of |
And if I enable "run command as a login shell" , the --execute-command is not run. |
Debian Sid
KDE Plasma Version : 5.24.3
KDE Framework: 5.90
QT Version: 5.15.2
Kernel : 5.16.0
Graphics X11
After upgrading to 3.8.5 my guake startup scripts do not execute properly anymore
Script:
After the script runs it normally would execute all of these commands no problem, after the update it wont work.
https://imgur.com/4B5H9xp
The tabs are not being renamed and my ssh, sh, and irssi sessions aren't opening, it just opens a tab in my home directory for each command in the script.
This is the error output i get when I run the command from a terminal (it gives me this output for each failed tab that opens):
The text was updated successfully, but these errors were encountered: