Lucene search

K
gentooGentoo FoundationGLSA-200803-06
HistoryMar 03, 2008 - 12:00 a.m.

SWORD: Shell command injection

2008-03-0300:00:00
Gentoo Foundation
security.gentoo.org
13

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

87.2%

Background

SWORD is a library for Bible study software.

Description

Dan Dennison reported that the diatheke.pl script used in SWORD does not properly sanitize shell meta-characters in the “range” parameter before processing it.

Impact

A remote attacker could provide specially crafted input to a vulnerable application, possibly resulting in the remote execution of arbitrary shell commands with the privileges of the user running SWORD (generally the web server account).

Workaround

There is no known workaround at this time.

Resolution

All SWORD users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-text/sword-1.5.8-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-text/sword< 1.5.8-r2UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

87.2%