quelea-projection / Quelea

Open source projection software for churches.
https://quelea.org
GNU General Public License v3.0
154 stars 145 forks source link

Direct Use of Unsafe JNI [SECURITY] #hacktoberfest #567

Closed chawdamrunal closed 6 months ago

chawdamrunal commented 1 year ago

commit : https://github.com/quelea-projection/Quelea/commit/7d8c235c4270d56389a9ccd95ad44e75c100e90a#diff-bd66c6f15a6083331abcae3625541567a83531e39bc44bd56c04c1e560a028d8

runOnVIDThread method calls a native code library at line 123 of Quelea- master/Quelea/src/main/java/org/quelea/windows/multimedia/MacVideo.java, passing it sanitisedPath as a parameter. However, this parameter is based on user input getText, which flows through the system without validation, after entering the system in getTheme at line 423 of Quelea-master/Quelea/src/main/java/org/quelea/windows/newsong/ThemeToolbar.java. This could enable an attacker to bypass security mechanisms and exploit a vulnerability in the native code.

Recommendations :

berry120 commented 6 months ago

This class is no longer in use after a refactor.