Описание
general/login.php in phpCollab 2.5 rc3 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified input related to the SSL_CLIENT_CERT environment variable. NOTE: in some environments, SSL_CLIENT_CERT always has a base64-encoded string value, which may impose constraints on injection for typical shells.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.5 (включая)
Одно из
cpe:2.3:a:phpcollab:phpcollab:*:rc3:*:*:*:*:*:*
cpe:2.3:a:phpcollab:phpcollab:2.2:*:*:*:*:*:*:*
cpe:2.3:a:phpcollab:phpcollab:2.3:*:*:*:*:*:*:*
cpe:2.3:a:phpcollab:phpcollab:2.4:*:*:*:*:*:*:*
cpe:2.3:a:phpcollab:phpcollab:2.5:beta_4:*:*:*:*:*:*
cpe:2.3:a:phpcollab:phpcollab:2.5:rc1:*:*:*:*:*:*
cpe:2.3:a:phpcollab:phpcollab:2.5:rc2:*:*:*:*:*:*
EPSS
Процентиль: 82%
0.01794
Низкий
10 Critical
CVSS2
Дефекты
CWE-78
Связанные уязвимости
github
почти 4 года назад
general/login.php in phpCollab 2.5 rc3 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified input related to the SSL_CLIENT_CERT environment variable. NOTE: in some environments, SSL_CLIENT_CERT always has a base64-encoded string value, which may impose constraints on injection for typical shells.
EPSS
Процентиль: 82%
0.01794
Низкий
10 Critical
CVSS2
Дефекты
CWE-78