cbrPager before 0.9.17 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a (1) ZIP (aka .cbz) or (2) RAR (aka .cbr) archive filename.
References
Configurations
History
21 Nov 2024, 00:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 - Broken Link, Exploit | |
References | () http://secunia.com/advisories/30417 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/30438 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/30701 - Broken Link | |
References | () http://security.gentoo.org/glsa/glsa-200806-05.xml - Third Party Advisory | |
References | () http://sourceforge.net/forum/forum.php?forum_id=827120 - Broken Link, Patch | |
References | () http://sourceforge.net/project/shownotes.php?release_id=601538&group_id=119647 - Patch | |
References | () http://www.jcoppens.com/soft/cbrpager/log.en.php - Release Notes | |
References | () http://www.vupen.com/english/advisories/2008/1693/references - Broken Link | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=448285 - Issue Tracking, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 - Third Party Advisory, VDB Entry |
02 Feb 2024, 15:13
Type | Values Removed | Values Added |
---|---|---|
References | (VUPEN) http://www.vupen.com/english/advisories/2008/1693/references - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/30417 - Broken Link, Vendor Advisory | |
References | (CONFIRM) http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 - Broken Link, Exploit | |
References | (SECUNIA) http://secunia.com/advisories/30438 - Broken Link, Vendor Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=448285 - Issue Tracking, Third Party Advisory | |
References | (CONFIRM) http://www.jcoppens.com/soft/cbrpager/log.en.php - Release Notes | |
References | (CONFIRM) http://sourceforge.net/forum/forum.php?forum_id=827120 - Broken Link, Patch | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/30701 - Broken Link | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-200806-05.xml - Third Party Advisory | |
CWE | CWE-78 | |
CPE | cpe:2.3:a:jcoppens:cbrpager:0.9.4:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.7:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.15:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.12:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.10:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.6:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.8:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.16:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.11:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.13:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.9:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.5:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.2:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:0.9.14:*:*:*:*:*:*:* |
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:* cpe:2.3:a:jcoppens:cbrpager:*:*:*:*:*:*:*:* |
First Time |
Fedoraproject
Fedoraproject fedora |
Information
Published : 2008-06-06 22:32
Updated : 2024-11-21 00:47
NVD link : CVE-2008-2575
Mitre link : CVE-2008-2575
CVE.ORG link : CVE-2008-2575
JSON object : View
Products Affected
jcoppens
- cbrpager
fedoraproject
- fedora
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')