René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

134 lines
3.9 KiB
JSON

{
"id": "CVE-2008-7319",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-11-07T21:29:00.213",
"lastModified": "2017-11-29T15:49:23.987",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used."
},
{
"lang": "es",
"value": "La extensi\u00f3n Net::Ping::External hasta la versi\u00f3n 0.15 para Perl no sanitiza correctamente los argumentos (ej.: nombres de host no v\u00e1lidos) que contienen metacaracteres shell antes del uso del car\u00e1cter de acento grave (`) en External.pm. Esto permite la inyecci\u00f3n de comandos shell y la ejecuci\u00f3n de comandos arbitrarios si se emplean entradas no fiables."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:net-ping-external_project:net-ping-external:*:*:*:*:*:perl:*:*",
"versionEndIncluding": "0.15",
"matchCriteriaId": "A5D3C017-6D62-478C-AFCE-21AD78D07D9D"
}
]
}
]
}
],
"references": [
{
"url": "http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2017/11/07/4",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://bugs.debian.org/881097",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=33230",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
}
]
}