CVE-2018-9246

The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pgobject-util-dbadmin_project:pgobject-util-dbadmin:*:*:*:*:*:perl:*:*

Configuration 2 (hide)

cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:15

Type Values Removed Values Added
References () https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html - Vendor Advisory () https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html - Vendor Advisory

Information

Published : 2018-06-08 01:29

Updated : 2024-11-21 04:15


NVD link : CVE-2018-9246

Mitre link : CVE-2018-9246

CVE.ORG link : CVE-2018-9246


JSON object : View

Products Affected

ledgersmb

  • ledgersmb

pgobject-util-dbadmin_project

  • pgobject-util-dbadmin
CWE
CWE-116

Improper Encoding or Escaping of Output