cgi-bin/iptablesgui.cgi in IPCop (aka IPCop Firewall) before 2.1.5 allows remote authenticated users to execute arbitrary code via shell metacharacters in the TABLE parameter. NOTE: this can be exploited remotely by leveraging a separate cross-site scripting (XSS) vulnerability.
References
Configurations
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/129697/IPCop-2.1.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html - Exploit | |
References | () http://sourceforge.net/p/ipcop/bugs/807/ - Exploit | |
References | () http://www.asafety.fr/vuln-exploit-poc/xss-rce-ipcop-2-1-4-remote-command-execution/ - Exploit |
Information
Published : 2015-01-02 22:59
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7418
Mitre link : CVE-2013-7418
CVE.ORG link : CVE-2013-7418
JSON object : View
Products Affected
ipcop
- ipcop
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')