CVE-2017-16926

Ohcount 3.0.0 is prone to a command injection via specially crafted filenames containing shell metacharacters, which can be exploited by an attacker (providing a source tree for Ohcount processing) to execute arbitrary code as the user running Ohcount.
References
Link Resource
https://bugs.debian.org/882372 Exploit Vendor Advisory
https://bugs.debian.org/882372 Exploit Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ohcount_project:ohcount:3.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:17

Type Values Removed Values Added
References () https://bugs.debian.org/882372 - Exploit, Vendor Advisory () https://bugs.debian.org/882372 - Exploit, Vendor Advisory

Information

Published : 2017-11-22 08:29

Updated : 2024-11-21 03:17


NVD link : CVE-2017-16926

Mitre link : CVE-2017-16926

CVE.ORG link : CVE-2017-16926


JSON object : View

Products Affected

ohcount_project

  • ohcount
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')