CVE-2008-7313

The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands. NOTE: this issue exists dues to an incomplete fix for CVE-2008-4796.
References
Link Resource
http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27 Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/09/11 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/16/10 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/18/2 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/68776 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1121497 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/94737 Third Party Advisory VDB Entry
https://rhn.redhat.com/errata/RHSA-2017-0211.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0212.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0213.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0214.html Patch Third Party Advisory
https://security.gentoo.org/glsa/201702-26 Patch Third Party Advisory VDB Entry
https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264 Third Party Advisory
http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27 Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/09/11 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/16/10 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/18/2 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/68776 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1121497 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/94737 Third Party Advisory VDB Entry
https://rhn.redhat.com/errata/RHSA-2017-0211.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0212.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0213.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0214.html Patch Third Party Advisory
https://security.gentoo.org/glsa/201702-26 Patch Third Party Advisory VDB Entry
https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:snoopy:snoopy:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:58

Type Values Removed Values Added
References () http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27 - Patch, Third Party Advisory () http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27 - Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2014/07/09/11 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/07/09/11 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2014/07/16/10 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/07/16/10 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2014/07/18/2 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/07/18/2 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/68776 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/68776 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1121497 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=1121497 - Issue Tracking, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/94737 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/94737 - Third Party Advisory, VDB Entry
References () https://rhn.redhat.com/errata/RHSA-2017-0211.html - Patch, Third Party Advisory () https://rhn.redhat.com/errata/RHSA-2017-0211.html - Patch, Third Party Advisory
References () https://rhn.redhat.com/errata/RHSA-2017-0212.html - Patch, Third Party Advisory () https://rhn.redhat.com/errata/RHSA-2017-0212.html - Patch, Third Party Advisory
References () https://rhn.redhat.com/errata/RHSA-2017-0213.html - Patch, Third Party Advisory () https://rhn.redhat.com/errata/RHSA-2017-0213.html - Patch, Third Party Advisory
References () https://rhn.redhat.com/errata/RHSA-2017-0214.html - Patch, Third Party Advisory () https://rhn.redhat.com/errata/RHSA-2017-0214.html - Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201702-26 - Patch, Third Party Advisory, VDB Entry () https://security.gentoo.org/glsa/201702-26 - Patch, Third Party Advisory, VDB Entry
References () https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264 - Third Party Advisory () https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264 - Third Party Advisory

Information

Published : 2017-03-31 16:59

Updated : 2024-11-21 00:58


NVD link : CVE-2008-7313

Mitre link : CVE-2008-7313

CVE.ORG link : CVE-2008-7313


JSON object : View

Products Affected

nagios

  • nagios

redhat

  • openstack

snoopy

  • snoopy
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')