cvelist/2012/3xxx/CVE-2012-3366.json
2019-03-18 04:56:15 +00:00

92 lines
3.0 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3366",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with root access to the client to execute arbitrary commands via shell metacharacters in the UUID field to the server process (bcfg2-server)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be",
"refsource": "CONFIRM",
"url": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be"
},
{
"name": "DSA-2503",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2503"
},
{
"name": "49690",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49690"
},
{
"name": "[bcfg-dev] 20120612 Major security flaw in Trigger plugin",
"refsource": "MLIST",
"url": "http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539"
},
{
"name": "54217",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54217"
},
{
"name": "49629",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49629"
},
{
"name": "bcfg2-trigger-command-execution(76616)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76616"
}
]
}
}