scripts/wwwacct in cPanel 11.18.6 STABLE and earlier and 11.23.1 CURRENT and earlier allows remote authenticated users with reseller privileges to execute arbitrary code via shell metacharacters in the Email address field (aka Email text box). NOTE: the vendor disputes this, stating "I'm unable to reproduce such an issue on multiple servers running different versions of cPanel.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/492223/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/492259/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/29277 - Exploit | |
References | () http://www.securitytracker.com/id?1020042 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42529 - |
07 Nov 2023, 02:02
Type | Values Removed | Values Added |
---|---|---|
Summary | scripts/wwwacct in cPanel 11.18.6 STABLE and earlier and 11.23.1 CURRENT and earlier allows remote authenticated users with reseller privileges to execute arbitrary code via shell metacharacters in the Email address field (aka Email text box). NOTE: the vendor disputes this, stating "I'm unable to reproduce such an issue on multiple servers running different versions of cPanel. |
Information
Published : 2008-05-28 15:32
Updated : 2024-11-21 00:46
NVD link : CVE-2008-2478
Mitre link : CVE-2008-2478
CVE.ORG link : CVE-2008-2478
JSON object : View
Products Affected
cpanel
- cpanel
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')