Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2010-2060

Опубликовано: 08 июн. 2010
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

Комментарий

Per: http://cwe.mitre.org/data/definitions/77.html

'CWE-77: Improper Sanitization of Special Elements used in a Command ('Command Injection')'

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:wildbit:beanstalkd:*:*:*:*:*:*:*:*
Версия до 1.4.5 (включая)
cpe:2.3:a:wildbit:beanstalkd:0.5:-:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:0.6:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:0.7:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:0.8:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:0.9:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:0.10:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:1.0:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:1.1:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:1.2:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:1.3:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:1.4:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:wildbit:beanstalkd:1.4.4:*:*:*:*:*:*:*

EPSS

Процентиль: 76%
0.01003
Низкий

7.5 High

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

ubuntu
больше 15 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

redhat
больше 15 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

debian
больше 15 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows r ...

github
больше 3 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

EPSS

Процентиль: 76%
0.01003
Низкий

7.5 High

CVSS2

Дефекты

NVD-CWE-Other