Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6hq5-3246-pmqx

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe.

Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe.

EPSS

Процентиль: 99%
0.83651
Высокий

Дефекты

CWE-78

Связанные уязвимости

nvd
больше 23 лет назад

Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe.

EPSS

Процентиль: 99%
0.83651
Высокий

Дефекты

CWE-78