The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.
References
Link | Resource |
---|---|
https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html | Vendor Advisory |
https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html - Vendor Advisory |
Information
Published : 2018-06-08 01:29
Updated : 2024-11-21 04:15
NVD link : CVE-2018-9246
Mitre link : CVE-2018-9246
CVE.ORG link : CVE-2018-9246
JSON object : View
Products Affected
ledgersmb
- ledgersmb
pgobject-util-dbadmin_project
- pgobject-util-dbadmin
CWE
CWE-116
Improper Encoding or Escaping of Output