[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-1815Date: (C)2015-03-30   (M)2023-12-22


The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
OSVDB-119966
EXPLOIT-DB-36564
BID-73374
FEDORA-2015-4792
FEDORA-2015-4833
FEDORA-2015-4838
RHSA-2015:0729
http://www.openwall.com/lists/oss-security/2015/03/26/1
https://bugzilla.redhat.com/show_bug.cgi?id=1203352
https://bugzilla.redhat.com/show_bug.cgi?id=1206050
https://github.com/stealth/troubleshooter

CWE    1
CWE-77
OVAL    9
oval:org.secpod.oval:def:203586
oval:org.secpod.oval:def:203575
oval:org.secpod.oval:def:1500958
oval:org.secpod.oval:def:1500957
...

© SecPod Technologies