Numara FootPrints 7.5a through 7.5a1 and 8.0 through 8.0a allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) transcriptFile parameter to MRcgi/MRchat.pl or (2) LOADFILE parameter to MRcgi/MRABLoad2.pl. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/42813 - | |
References | () http://osvdb.org/42816 - | |
References | () http://secunia.com/advisories/28390 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/27373 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/39810 - | |
References | () https://footprintssupport.numarasoftware.com/MRcgi/MRTicketPage.pl?USER=&MRP=0&PROJECTID=4&MR=89552&MAXMININC=&MAJOR_MODE=DETAILS - Patch, Vendor Advisory |
Information
Published : 2009-09-02 17:30
Updated : 2024-11-21 00:58
NVD link : CVE-2008-7158
Mitre link : CVE-2008-7158
CVE.ORG link : CVE-2008-7158
JSON object : View
Products Affected
numarasoftware
- footprints
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')