Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-9246

Опубликовано: 08 июн. 2018
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:pgobject-util-dbadmin_project:pgobject-util-dbadmin:*:*:*:*:*:perl:*:*
Версия до 0.120.0 (исключая)
Конфигурация 2
cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:*
Версия от 1.5.0 (включая) до 1.5.21 (включая)

EPSS

Процентиль: 76%
0.00971
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-116

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.

CVSS3: 9.8
debian
больше 7 лет назад

The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in ...

CVSS3: 9.8
github
больше 3 лет назад

The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.

EPSS

Процентиль: 76%
0.00971
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-116