CVE-2006-3633

OSSP shiela 1.1.5 and earlier allows remote authenticated users to execute arbitrary commands on the CVS server via shell metacharacters in a filename that is committed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ossp:shiela:*:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ossp:shiela:1.1.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:14

Type Values Removed Values Added
References () http://secunia.com/advisories/21209 - Patch, Vendor Advisory () http://secunia.com/advisories/21209 - Patch, Vendor Advisory
References () http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.014-shiela.html - Patch, Vendor Advisory () http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.014-shiela.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/19199 - Patch () http://www.securityfocus.com/bid/19199 - Patch
References () http://www.sourcefire.com/services/advisories/sa072506.html - Patch, Vendor Advisory () http://www.sourcefire.com/services/advisories/sa072506.html - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/2986 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2986 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27978 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27978 -

Information

Published : 2006-07-27 01:04

Updated : 2024-11-21 00:14


NVD link : CVE-2006-3633

Mitre link : CVE-2006-3633

CVE.ORG link : CVE-2006-3633


JSON object : View

Products Affected

ossp

  • shiela
CWE
CWE-20

Improper Input Validation