Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2009-4261

Опубликовано: 21 дек. 2009
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

Multiple directory traversal vulnerabilities in the iallocator framework in Ganeti 1.2.4 through 1.2.8, 2.0.0 through 2.0.4, and 2.1.0 before 2.1.0~rc2 allow (1) remote attackers to execute arbitrary programs via a crafted external script name supplied through the HTTP remote API (RAPI) and allow (2) local users to execute arbitrary programs and gain privileges via a crafted external script name supplied through a gnt-* command, related to "path sanitization errors."

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:roman_marxer:ganeti:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:roman_marxer:ganeti:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:roman_marxer:ganeti:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:roman_marxer:ganeti:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:roman_marxer:ganeti:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:roman_marxer:ganeti:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:roman_marxer:ganeti:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:roman_marxer:ganeti:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:roman_marxer:ganeti:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:roman_marxer:ganeti:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:roman_marxer:ganeti:2.1.0:rc1:*:*:*:*:*:*

EPSS

Процентиль: 71%
0.00682
Низкий

7.5 High

CVSS2

Дефекты

CWE-22

Связанные уязвимости

ubuntu
около 16 лет назад

Multiple directory traversal vulnerabilities in the iallocator framework in Ganeti 1.2.4 through 1.2.8, 2.0.0 through 2.0.4, and 2.1.0 before 2.1.0~rc2 allow (1) remote attackers to execute arbitrary programs via a crafted external script name supplied through the HTTP remote API (RAPI) and allow (2) local users to execute arbitrary programs and gain privileges via a crafted external script name supplied through a gnt-* command, related to "path sanitization errors."

debian
около 16 лет назад

Multiple directory traversal vulnerabilities in the iallocator framewo ...

github
больше 3 лет назад

Multiple directory traversal vulnerabilities in the iallocator framework in Ganeti 1.2.4 through 1.2.8, 2.0.0 through 2.0.4, and 2.1.0 before 2.1.0~rc2 allow (1) remote attackers to execute arbitrary programs via a crafted external script name supplied through the HTTP remote API (RAPI) and allow (2) local users to execute arbitrary programs and gain privileges via a crafted external script name supplied through a gnt-* command, related to "path sanitization errors."

EPSS

Процентиль: 71%
0.00682
Низкий

7.5 High

CVSS2

Дефекты

CWE-22