Описание
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2009-2288
- http://marc.info/?l=bugtraq&m=126996888626964&w=2
- http://secunia.com/advisories/35543
- http://secunia.com/advisories/35688
- http://secunia.com/advisories/35692
- http://secunia.com/advisories/39227
- http://security.gentoo.org/glsa/glsa-200907-15.xml
- http://tracker.nagios.org/view.php?id=15
- http://www.debian.org/security/2009/dsa-1825
- http://www.nagios.org/development/history/core-3x
- http://www.securitytracker.com/id?1022503
- http://www.ubuntu.com/usn/USN-795-1
- http://www.vupen.com/english/advisories/2010/0750
Связанные уязвимости
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execut ...