CVE-2008-7158

Numara FootPrints 7.5a through 7.5a1 and 8.0 through 8.0a allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) transcriptFile parameter to MRcgi/MRchat.pl or (2) LOADFILE parameter to MRcgi/MRABLoad2.pl. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:numarasoftware:footprints:7.5a:*:*:*:*:*:*:*
cpe:2.3:a:numarasoftware:footprints:7.5a1:*:*:*:*:*:*:*
cpe:2.3:a:numarasoftware:footprints:8.0:*:*:*:*:*:*:*
cpe:2.3:a:numarasoftware:footprints:8.0a:*:*:*:*:*:*:*

History

21 Nov 2024, 00:58

Type Values Removed Values Added
References () http://osvdb.org/42813 - () http://osvdb.org/42813 -
References () http://osvdb.org/42816 - () http://osvdb.org/42816 -
References () http://secunia.com/advisories/28390 - Vendor Advisory () http://secunia.com/advisories/28390 - Vendor Advisory
References () http://www.securityfocus.com/bid/27373 - () http://www.securityfocus.com/bid/27373 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/39810 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/39810 -
References () https://footprintssupport.numarasoftware.com/MRcgi/MRTicketPage.pl?USER=&MRP=0&PROJECTID=4&MR=89552&MAXMININC=&MAJOR_MODE=DETAILS - Patch, Vendor Advisory () https://footprintssupport.numarasoftware.com/MRcgi/MRTicketPage.pl?USER=&MRP=0&PROJECTID=4&MR=89552&MAXMININC=&MAJOR_MODE=DETAILS - Patch, Vendor Advisory

Information

Published : 2009-09-02 17:30

Updated : 2024-11-21 00:58


NVD link : CVE-2008-7158

Mitre link : CVE-2008-7158

CVE.ORG link : CVE-2008-7158


JSON object : View

Products Affected

numarasoftware

  • footprints
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')