Описание
Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe.
Ссылки
- Mailing ListThird Party Advisory
- Broken LinkThird Party AdvisoryVDB Entry
- Release Notes
- Broken Link
- Broken LinkThird Party AdvisoryVDB Entry
- Issue TrackingMailing ListVendor Advisory
- Issue TrackingMailing ListVendor Advisory
- Issue TrackingMailing ListVendor Advisory
- Issue TrackingMailing ListVendor Advisory
- Mailing ListThird Party Advisory
- Broken LinkThird Party AdvisoryVDB Entry
- Release Notes
- Broken Link
- Broken LinkThird Party AdvisoryVDB Entry
- Issue TrackingMailing ListVendor Advisory
- Issue TrackingMailing ListVendor Advisory
- Issue TrackingMailing ListVendor Advisory
- Issue TrackingMailing ListVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.3.24 (исключая)Версия от 2.0.0 (включая) до 2.0.34 (исключая)
Одно из
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.83651
Высокий
7.5 High
CVSS2
Дефекты
CWE-78
Связанные уязвимости
github
больше 3 лет назад
Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe.
EPSS
Процентиль: 99%
0.83651
Высокий
7.5 High
CVSS2
Дефекты
CWE-78