CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
85.5%
The server in Bcfg2 1.1.2 and earlier, and 1.2 prerelease, allows remote attackers to execute arbitrary commands via shell metacharacters in data received from a client.
Vendor | Product | Version | CPE |
---|---|---|---|
bcfg2 | bcfg2 | * | cpe:2.3:a:bcfg2:bcfg2:*:*:*:*:*:*:*:* |
bcfg2 | bcfg2 | 0.3.1 | cpe:2.3:a:bcfg2:bcfg2:0.3.1:*:*:*:*:*:*:* |
bcfg2 | bcfg2 | 0.4 | cpe:2.3:a:bcfg2:bcfg2:0.4:*:*:*:*:*:*:* |
bcfg2 | bcfg2 | 0.5 | cpe:2.3:a:bcfg2:bcfg2:0.5:*:*:*:*:*:*:* |
bcfg2 | bcfg2 | 0.6 | cpe:2.3:a:bcfg2:bcfg2:0.6:*:*:*:*:*:*:* |
bcfg2 | bcfg2 | 0.6.1 | cpe:2.3:a:bcfg2:bcfg2:0.6.1:*:*:*:*:*:*:* |
bcfg2 | bcfg2 | 0.6.3 | cpe:2.3:a:bcfg2:bcfg2:0.6.3:*:*:*:*:*:*:* |
bcfg2 | bcfg2 | 0.6.4 | cpe:2.3:a:bcfg2:bcfg2:0.6.4:*:*:*:*:*:*:* |
bcfg2 | bcfg2 | 0.6.5 | cpe:2.3:a:bcfg2:bcfg2:0.6.5:*:*:*:*:*:*:* |
bcfg2 | bcfg2 | 0.6.6 | cpe:2.3:a:bcfg2:bcfg2:0.6.6:*:*:*:*:*:*:* |
article.gmane.org/gmane.comp.sysutils.bcfg2.devel/4318
bugs.debian.org/cgi-bin/bugreport.cgi?bug=640028
lists.fedoraproject.org/pipermail/package-announce/2011-September/066070.html
lists.fedoraproject.org/pipermail/package-announce/2011-September/066071.html
openwall.com/lists/oss-security/2011/09/01/1
openwall.com/lists/oss-security/2011/09/06/1
secunia.com/advisories/45807
secunia.com/advisories/45926
secunia.com/advisories/46042
www.debian.org/security/2011/dsa-2302
www.securityfocus.com/bid/49414
bugzilla.redhat.com/show_bug.cgi?id=736279
github.com/solj/bcfg2/commit/46795ae451ca6ede55a0edeb726978aef4684b53
github.com/solj/bcfg2/commit/f4a35efec1b6a1e54d61cf1b8bfc83dd1d89eef7