Ohcount 3.0.0 is prone to a command injection via specially crafted filenames containing shell metacharacters, which can be exploited by an attacker (providing a source tree for Ohcount processing) to execute arbitrary code as the user running Ohcount.
References
Link | Resource |
---|---|
https://bugs.debian.org/882372 | Exploit Vendor Advisory |
https://bugs.debian.org/882372 | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.debian.org/882372 - Exploit, Vendor Advisory |
Information
Published : 2017-11-22 08:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-16926
Mitre link : CVE-2017-16926
CVE.ORG link : CVE-2017-16926
JSON object : View
Products Affected
ohcount_project
- ohcount
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')