{ "id": "CVE-2006-3633", "sourceIdentifier": "secalert@redhat.com", "published": "2006-07-27T01:04:00.000", "lastModified": "2017-07-20T01:32:27.787", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "OSSP shiela 1.1.5 and earlier allows remote authenticated users to execute arbitrary commands on the CVS server via shell metacharacters in a filename that is committed." }, { "lang": "es", "value": "OSSP shiela 1.1.5 y anteriores permite a usuarios autenticados remotamente ejecutar comandos de su elecci\u00f3n en el servidor CVS mediante meta-caracteres de l\u00ednea de comandos en un nombre de archivo que es enviado (commited)." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.1.5", "matchCriteriaId": "BB25CF9F-B80B-4ED1-A412-DB9CEC9702A5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E4ADD90-131F-4741-A844-3B2174BE70FF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E8BD603-A42B-4256-90DA-57AEB6C9E50C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A865B5B-747E-4291-A04B-BD7D62000971" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B31C1B50-381A-4821-B392-0DA9FA61A69A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "42E76393-336A-4FF7-BC73-6B580B619C76" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "782A6EF6-2997-45A7-BD58-159124FA2A26" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0A93BF8B-61D2-4BC7-886A-1CBCDCFEA03F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "83BDB983-518D-4633-AADA-3950A89D2CEC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "09FBB3AE-46D7-4799-BD83-141B142F3642" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CA3FC26-F2A4-4C4F-B582-680A22084DF5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DDC9D8CF-3E8F-463D-963E-6BAE419B8E39" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DC369D29-3A18-4C10-A73B-A264383F9EB0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ossp:shiela:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "40268639-EB96-44F8-A76B-10998992E58F" } ] } ] } ], "references": [ { "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.014-shiela.html", "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/19199", "source": "secalert@redhat.com", "tags": [ "Patch" ] }, { "url": "http://www.sourcefire.com/services/advisories/sa072506.html", "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2006/2986", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27978", "source": "secalert@redhat.com" } ] }