[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-4372

Date: (C)2009-12-21   (M)2017-08-18
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











AlienVault Open Source Security Information Management (OSSIM) 2.1.5, and possibly other versions before 2.1.5-4, allows remote attackers to execute arbitrary commands via shell metacharacters in the uniqueid parameter to (1) wcl.php, (2) storage_graphs.php, (3) storage_graphs2.php, (4) storage_graphs3.php, and (5) storage_graphs4.php in sem/.

Reference:
EXPLOIT-DB-10480
BID-37375
SECUNIA-37727
OSVDB-61151
OSVDB-61152
OSVDB-61153
OSVDB-61154
OSVDB-61155
http://www.alienvault.com/community.php?section=News
http://www.cybsec.com/vuln/OSSIM_2_1_5_Remote_Command_Execution.pdf
ossim-uniqueid-command-execution(54843)

CPE    4
cpe:/a:alienvault:open_source_security_information_management:2.1.5-3
cpe:/a:alienvault:open_source_security_information_management:2.1.5-2
cpe:/a:alienvault:open_source_security_information_management:2.1.5-1
cpe:/a:alienvault:open_source_security_information_management:2.1.5
...
CWE    1
CWE-20

© 2013 SecPod Technologies