[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2015-1815

Date: (C)2015-03-30   (M)2017-11-15 


The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.

CVSS Score: 10.0Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
OSVDB-119966
EXPLOIT-DB-36564
BID-73374
FEDORA-2015-4792
FEDORA-2015-4833
FEDORA-2015-4838
RHSA-2015:0729
http://www.openwall.com/lists/oss-security/2015/03/26/1
https://bugzilla.redhat.com/show_bug.cgi?id=1203352
https://bugzilla.redhat.com/show_bug.cgi?id=1206050
https://github.com/stealth/troubleshooter

CPE    1
cpe:/o:fedoraproject:fedora:22
CWE    1
CWE-77
OVAL    9
oval:org.secpod.oval:def:203575
oval:org.secpod.oval:def:203586
oval:org.secpod.oval:def:1500958
oval:org.secpod.oval:def:1500957
...

© 2013 SecPod Technologies