CVE-2013-7418

cgi-bin/iptablesgui.cgi in IPCop (aka IPCop Firewall) before 2.1.5 allows remote authenticated users to execute arbitrary code via shell metacharacters in the TABLE parameter. NOTE: this can be exploited remotely by leveraging a separate cross-site scripting (XSS) vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:o:ipcop:ipcop:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:00

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/129697/IPCop-2.1.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html - Exploit () http://packetstormsecurity.com/files/129697/IPCop-2.1.4-Cross-Site-Request-Forgery-Cross-Site-Scripting.html - Exploit
References () http://sourceforge.net/p/ipcop/bugs/807/ - Exploit () http://sourceforge.net/p/ipcop/bugs/807/ - Exploit
References () http://www.asafety.fr/vuln-exploit-poc/xss-rce-ipcop-2-1-4-remote-command-execution/ - Exploit () http://www.asafety.fr/vuln-exploit-poc/xss-rce-ipcop-2-1-4-remote-command-execution/ - Exploit

Information

Published : 2015-01-02 22:59

Updated : 2024-11-21 02:00


NVD link : CVE-2013-7418

Mitre link : CVE-2013-7418

CVE.ORG link : CVE-2013-7418


JSON object : View

Products Affected

ipcop

  • ipcop
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')