The server in Bcfg2 1.1.2 and earlier, and 1.2 prerelease, allows remote attackers to execute arbitrary commands via shell metacharacters in data received from a client.
article.gmane.org/gmane.comp.sysutils.bcfg2.devel/4318
bugs.debian.org/cgi-bin/bugreport.cgi?bug=640028
lists.fedoraproject.org/pipermail/package-announce/2011-September/066070.html
lists.fedoraproject.org/pipermail/package-announce/2011-September/066071.html
openwall.com/lists/oss-security/2011/09/01/1
openwall.com/lists/oss-security/2011/09/06/1
secunia.com/advisories/45807
secunia.com/advisories/45926
secunia.com/advisories/46042
www.debian.org/security/2011/dsa-2302
www.securityfocus.com/bid/49414
bugzilla.redhat.com/show_bug.cgi?id=736279
github.com/solj/bcfg2/commit/46795ae451ca6ede55a0edeb726978aef4684b53
github.com/solj/bcfg2/commit/f4a35efec1b6a1e54d61cf1b8bfc83dd1d89eef7