[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108639

 
 

909

 
 

85415

 
 

134

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2015-1815Date: (C)2015-03-30   (M)2018-05-10


The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 10.0
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: COMPLETE
Scope: Integrity: COMPLETE
Confidentiality: Availability: COMPLETE
Integrity:  
Availability:  
  
Reference:
OSVDB-119966
EXPLOIT-DB-36564
BID-73374
FEDORA-2015-4792
FEDORA-2015-4833
FEDORA-2015-4838
RHSA-2015:0729
http://www.openwall.com/lists/oss-security/2015/03/26/1
https://bugzilla.redhat.com/show_bug.cgi?id=1203352
https://bugzilla.redhat.com/show_bug.cgi?id=1206050
https://github.com/stealth/troubleshooter

CPE    1
cpe:/o:fedoraproject:fedora:22
CWE    1
CWE-77
OVAL    9
oval:org.secpod.oval:def:501545
oval:org.secpod.oval:def:108668
oval:org.secpod.oval:def:108669
oval:org.secpod.oval:def:1500957
...

© SecPod Technologies