CVE-2008-4796

The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
References
Link Resource
http://jvn.jp/en/jp/JVN20502807/index.html Third Party Advisory VDB Entry
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html Third Party Advisory VDB Entry
http://secunia.com/advisories/32361 Third Party Advisory
http://sourceforge.net/forum/forum.php?forum_id=879959 Broken Link Patch Third Party Advisory
http://www.debian.org/security/2008/dsa-1691 Third Party Advisory
http://www.debian.org/security/2009/dsa-1871 Third Party Advisory
http://www.openwall.com/lists/oss-security/2008/11/01/1 Mailing List Third Party Advisory
http://www.securityfocus.com/archive/1/496068/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31887 Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2901 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46068 Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/201702-26 Third Party Advisory
https://www.nagios.org/projects/nagios-core/history/4x/ Third Party Advisory
http://jvn.jp/en/jp/JVN20502807/index.html Third Party Advisory VDB Entry
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html Third Party Advisory VDB Entry
http://secunia.com/advisories/32361 Third Party Advisory
http://sourceforge.net/forum/forum.php?forum_id=879959 Broken Link Patch Third Party Advisory
http://www.debian.org/security/2008/dsa-1691 Third Party Advisory
http://www.debian.org/security/2009/dsa-1871 Third Party Advisory
http://www.openwall.com/lists/oss-security/2008/11/01/1 Mailing List Third Party Advisory
http://www.securityfocus.com/archive/1/496068/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31887 Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2901 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46068 Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/201702-26 Third Party Advisory
https://www.nagios.org/projects/nagios-core/history/4x/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:snoopy_project:snoopy:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:52

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN20502807/index.html - Third Party Advisory, VDB Entry () http://jvn.jp/en/jp/JVN20502807/index.html - Third Party Advisory, VDB Entry
References () http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html - Third Party Advisory, VDB Entry () http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html - Third Party Advisory, VDB Entry
References () http://secunia.com/advisories/32361 - Third Party Advisory () http://secunia.com/advisories/32361 - Third Party Advisory
References () http://sourceforge.net/forum/forum.php?forum_id=879959 - Broken Link, Patch, Third Party Advisory () http://sourceforge.net/forum/forum.php?forum_id=879959 - Broken Link, Patch, Third Party Advisory
References () http://www.debian.org/security/2008/dsa-1691 - Third Party Advisory () http://www.debian.org/security/2008/dsa-1691 - Third Party Advisory
References () http://www.debian.org/security/2009/dsa-1871 - Third Party Advisory () http://www.debian.org/security/2009/dsa-1871 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2008/11/01/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2008/11/01/1 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/archive/1/496068/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/496068/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/31887 - Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/31887 - Patch, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2008/2901 - Third Party Advisory () http://www.vupen.com/english/advisories/2008/2901 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46068 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/46068 - Third Party Advisory, VDB Entry
References () https://security.gentoo.org/glsa/201702-26 - Third Party Advisory () https://security.gentoo.org/glsa/201702-26 - Third Party Advisory
References () https://www.nagios.org/projects/nagios-core/history/4x/ - Third Party Advisory () https://www.nagios.org/projects/nagios-core/history/4x/ - Third Party Advisory

Information

Published : 2008-10-30 20:56

Updated : 2024-11-21 00:52


NVD link : CVE-2008-4796

Mitre link : CVE-2008-4796

CVE.ORG link : CVE-2008-4796


JSON object : View

Products Affected

snoopy_project

  • snoopy

debian

  • debian_linux

wordpress

  • wordpress

nagios

  • nagios
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')