The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with root access to the client to execute arbitrary commands via shell metacharacters in the UUID field to the server process (bcfg2-server).
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539 - | |
References | () http://secunia.com/advisories/49629 - Vendor Advisory | |
References | () http://secunia.com/advisories/49690 - Vendor Advisory | |
References | () http://www.debian.org/security/2012/dsa-2503 - | |
References | () http://www.securityfocus.com/bid/54217 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/76616 - | |
References | () https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be - Patch |
Information
Published : 2012-07-03 16:40
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3366
Mitre link : CVE-2012-3366
CVE.ORG link : CVE-2012-3366
JSON object : View
Products Affected
anl
- bcfg2
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')