The cTrigger::DoIt function in src/ctrigger.cpp in the trigger mechanism in the daemon in Verlihub 0.9.8d-RC2 and earlier, when user triggers are enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in an argument.
References
Configurations
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/506530 - | |
References | () http://openwall.com/lists/oss-security/2008/12/17/16 - | |
References | () http://securityreason.com/securityalert/4800 - | |
References | () http://www.securityfocus.com/bid/32420 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/46801 - | |
References | () https://www.exploit-db.com/exploits/7183 - |
Information
Published : 2008-12-22 15:30
Updated : 2024-11-21 00:54
NVD link : CVE-2008-5705
Mitre link : CVE-2008-5705
CVE.ORG link : CVE-2008-5705
JSON object : View
Products Affected
verlihub-project
- verlihub
CWE
CWE-20
Improper Input Validation