The _httpsrequest function in Snoopy 1.2, as used in products such as (1) MagpieRSS, (2) WordPress, (3) Ampache, and (4) Jinzora, allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTPS URL to an SSL protected web page, which is not properly handled by the fetch function.
References
Configurations
History
21 Nov 2024, 00:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=113028858316430&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=113062897231412&w=2 - | |
References | () http://secunia.com/advisories/17330 - | |
References | () http://secunia.com/advisories/17455 - Vendor Advisory | |
References | () http://secunia.com/advisories/17779 - Vendor Advisory | |
References | () http://secunia.com/advisories/17887 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/117 - | |
References | () http://securitytracker.com/id?1015104 - | |
References | () http://sourceforge.net/project/shownotes.php?release_id=368750 - | |
References | () http://sourceforge.net/project/shownotes.php?release_id=375385 - | |
References | () http://www.osvdb.org/20316 - | |
References | () http://www.securityfocus.com/bid/15213 - | |
References | () http://www.vupen.com/english/advisories/2005/2202 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2005/2335 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2005/2727 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/22874 - | |
References | () https://svn.ampache.org/branches/3.3.1/docs/CHANGELOG - |
Information
Published : 2005-10-27 10:02
Updated : 2024-11-21 00:01
NVD link : CVE-2005-3330
Mitre link : CVE-2005-3330
CVE.ORG link : CVE-2005-3330
JSON object : View
Products Affected
snoopy
- snoopy
CWE
CWE-20
Improper Input Validation