[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-3366Date: (C)2012-07-03   (M)2023-12-22


The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with root access to the client to execute arbitrary commands via shell metacharacters in the UUID field to the server process (bcfg2-server).

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.0
Exploit Score: 8.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: SINGLE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECUNIA-49629
SECUNIA-49690
BID-54217
DSA-2503
http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539
bcfg2-trigger-command-execution(76616)
https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be

CPE    2
cpe:/a:anl:bcfg2:1.2.0
cpe:/a:anl:bcfg2:1.2.0:rc2
CWE    1
CWE-78
OVAL    3
oval:org.secpod.oval:def:104260
oval:org.secpod.oval:def:104258
oval:org.secpod.oval:def:600843

© SecPod Technologies