AlienVault Open Source Security Information Management (OSSIM) 2.1.5, and possibly other versions before 2.1.5-4, allows remote attackers to execute arbitrary commands via shell metacharacters in the uniqueid parameter to (1) wcl.php, (2) storage_graphs.php, (3) storage_graphs2.php, (4) storage_graphs3.php, and (5) storage_graphs4.php in sem/.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/61151 - | |
References | () http://osvdb.org/61152 - | |
References | () http://osvdb.org/61153 - | |
References | () http://osvdb.org/61154 - | |
References | () http://osvdb.org/61155 - | |
References | () http://secunia.com/advisories/37727 - Vendor Advisory | |
References | () http://www.alienvault.com/community.php?section=News - Exploit | |
References | () http://www.cybsec.com/vuln/OSSIM_2_1_5_Remote_Command_Execution.pdf - Exploit | |
References | () http://www.exploit-db.com/exploits/10480 - Exploit | |
References | () http://www.securityfocus.com/bid/37375 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/54843 - |
Information
Published : 2009-12-21 16:30
Updated : 2024-11-21 01:09
NVD link : CVE-2009-4372
Mitre link : CVE-2009-4372
CVE.ORG link : CVE-2009-4372
JSON object : View
Products Affected
alienvault
- open_source_security_information_management
CWE
CWE-20
Improper Input Validation