statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=126996888626964&w=2 - | |
References | () http://secunia.com/advisories/35543 - Vendor Advisory | |
References | () http://secunia.com/advisories/35688 - | |
References | () http://secunia.com/advisories/35692 - | |
References | () http://secunia.com/advisories/39227 - | |
References | () http://security.gentoo.org/glsa/glsa-200907-15.xml - | |
References | () http://tracker.nagios.org/view.php?id=15 - Exploit | |
References | () http://www.debian.org/security/2009/dsa-1825 - | |
References | () http://www.nagios.org/development/history/core-3x/ - | |
References | () http://www.securitytracker.com/id?1022503 - | |
References | () http://www.ubuntu.com/usn/USN-795-1 - | |
References | () http://www.vupen.com/english/advisories/2010/0750 - |
Information
Published : 2009-07-01 13:00
Updated : 2024-11-21 01:04
NVD link : CVE-2009-2288
Mitre link : CVE-2009-2288
CVE.ORG link : CVE-2009-2288
JSON object : View
Products Affected
nagios
- nagios
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')