CVE-2008-0932

diatheke.pl in The SWORD Project Diatheke 1.5.9 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the range parameter.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:r1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*
cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora:8:*:*:*:*:*:*:*
OR cpe:2.3:a:the_sword_project:diatheke_front_end:*:*:*:*:*:*:*:*
cpe:2.3:a:the_sword_project:sword:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=466449 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=466449 -
References () http://secunia.com/advisories/25400 - () http://secunia.com/advisories/25400 -
References () http://secunia.com/advisories/29012 - Vendor Advisory () http://secunia.com/advisories/29012 - Vendor Advisory
References () http://secunia.com/advisories/29115 - Vendor Advisory () http://secunia.com/advisories/29115 - Vendor Advisory
References () http://secunia.com/advisories/29181 - () http://secunia.com/advisories/29181 -
References () http://security.gentoo.org/glsa/glsa-200803-06.xml - () http://security.gentoo.org/glsa/glsa-200803-06.xml -
References () http://www.debian.org/security/2008/dsa-1508 - () http://www.debian.org/security/2008/dsa-1508 -
References () http://www.securityfocus.com/bid/27874 - () http://www.securityfocus.com/bid/27874 -
References () http://www.securityfocus.com/bid/27987 - () http://www.securityfocus.com/bid/27987 -
References () http://www.vupen.com/english/advisories/2008/0670/references - () http://www.vupen.com/english/advisories/2008/0670/references -
References () https://bugzilla.redhat.com/show_bug.cgi?id=433723 - () https://bugzilla.redhat.com/show_bug.cgi?id=433723 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00769.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00769.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00806.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00806.html -

Information

Published : 2008-02-25 21:44

Updated : 2024-11-21 00:43


NVD link : CVE-2008-0932

Mitre link : CVE-2008-0932

CVE.ORG link : CVE-2008-0932


JSON object : View

Products Affected

redhat

  • fedora

debian

  • debian_linux

the_sword_project

  • diatheke_front_end
  • sword
CWE
CWE-20

Improper Input Validation