[Forgot Password]
Login  Register Subscribe

23631

 
 

127000

 
 

102010

 
 

909

 
 

81341

 
 

133

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2015-1815Date: (C)2015-03-30   (M)2018-02-19


The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score  : CVSS Score  : 10.0
Exploit Score: Exploit Score: 10.0
Impact Score : Impact Score : 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: COMPLETE
Scope: Integrity: COMPLETE
Confidentiality: Availability: COMPLETE
Integrity:  
Availability:  
  





Reference:
OSVDB-119966
EXPLOIT-DB-36564
BID-73374
FEDORA-2015-4792
FEDORA-2015-4833
FEDORA-2015-4838
RHSA-2015:0729
http://www.openwall.com/lists/oss-security/2015/03/26/1
https://bugzilla.redhat.com/show_bug.cgi?id=1203352
https://bugzilla.redhat.com/show_bug.cgi?id=1206050
https://github.com/stealth/troubleshooter

CPE    1
cpe:/o:fedoraproject:fedora:22
CWE    1
CWE-77
OVAL    9
oval:org.secpod.oval:def:203575
oval:org.secpod.oval:def:203586
oval:org.secpod.oval:def:1500958
oval:org.secpod.oval:def:1500957
...

© 2013 SecPod Technologies