Vulnerability CVE-2008-4796


Published: 2008-10-30   Modified: 2012-02-13

Description:
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.

See advisories in our WLB2 database:
Topic
Author
Date
High
snoopy command execution via shell metacharacters
Kurt Seifried
01.05.2013
Low
Feed2JS File Disclosure
Monte Ohrt &...
08.07.2014
High
Nagios Core Curl Command Injection / Code Execution
Dawid Golunski
16.12.2016

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Andrei zmievski -> Snoopy 

 References:
http://jvn.jp/en/jp/JVN20502807/index.html
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html
http://sourceforge.net/forum/forum.php?forum_id=879959
http://www.debian.org/security/2008/dsa-1691
http://www.debian.org/security/2009/dsa-1871
http://www.openwall.com/lists/oss-security/2008/11/01/1
http://www.securityfocus.com/archive/1/496068/100/0/threaded
http://www.securityfocus.com/bid/31887
http://www.vupen.com/english/advisories/2008/2901
https://exchange.xforce.ibmcloud.com/vulnerabilities/46068
https://security.gentoo.org/glsa/201702-26
https://www.nagios.org/projects/nagios-core/history/4x/

Copyright 2021, cxsecurity.com

 

Back to Top