AppImage file, you can refer to our guide on using AppImage on Linux.įor me, I’d prefer to have the Pling Store app installed to get things installed/removed quickly without needing to manage a separate folder for the downloads. AppImage file available to install the Pling Store on your Linux distro. The community is appreciative and supportive. And if you create any of the above content or mod themes or extensions, Pling Store is the perfect place for you to share your creations. Other goodiesĪ good number of fonts, desktop extensions, launchers and docs, system sounds, and lot of other stuff are available on Pling Store. So, you should be able to easily find the latest reviews/comments on an icon pack or theme or wallpaper before you want to try it – just to be sure. It doesn’t matter what desktop environment you have, you should get a bunch of icons/themes/wallpapers and a lot more stuff using Pling Store.Īlso, the network of sites that you will be visiting is actively managed and visited by a lot of users. This is probably the best place you should be looking at for themes/icons. Developers of such applications must put in a high level of scrutiny to ensure their security.Many users often asked where can they find themes and icons for Linux desktop. a missing origin check) can lead to severe consequences (drive-by RCE from any browser with the vulnerable application running in the background). In this environment, even relatively small vulnerabilities (e.g. demonstrate the additional risk associated with such marketplaces. Unfortunately, this is not the only situation in which an unpatched vulnerability in Linux Pling can become dangerous as a similar XSS flaw was uncovered in the GNOME Shell Extensions marketplace. The XSS gets triggered inside the Pling app while it’s running in the background allowing the JavaScript code to establish a connection to the local WebSocket server that’s used to listen to messages from the app, and also to send messages in order to execute arbitrary native code by downloading and executing an. It all starts with a user that visits a malicious website using the browser. As it turns out, that mechanism can be exploited by any website to run arbitrary native code while the PlingStore app is open in the background. The concerning fact is that this unpatched vulnerability in Linux Pling can allow for a supply-chain attack XSS worm in which a JavaScript payload could be exploited by an adversary to upload versions of software that are containing trojans and also to be able to tweak the metadata of a victim’s listing in order to include and propagate the attack code.Īs the application can install other applications, it has another built-in mechanism to execute code on the level. This specific unpatched vulnerability in Linux Pling is stemming from the manner in which the store’s product listings page parses HTML or embedded media fields, therefore potentially allowing an attacker to inject malicious JavaScript code that could result in arbitrary code execution. ![]() PlingStore is an Installer and Content Management App for OCS-compatible websites like, ,, that allows users to download, install and apply desktop themes, icon themes, wallpapers, or mouse cursors directly under various desktop environments using the “Install”-button. ![]() Some of the Pling-based app stores impacted by the flaw are, ,, , and. The native PlingStore application is affected by an RCE vulnerability, which can be triggered from any website while the app is running. Linux marketplaces that are based on the Pling platform are vulnerable to a wormable with the potential for a supply-chain attack. ![]() The newly discovered unpatched vulnerability in Linux Pling is affecting Pling-based free and open-source software (FOSS) marketplaces for the Linux platform and has the potential to be abused in order to stage supply-chain attacks and achieve remote code execution (RCE).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |