Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-2288

Опубликовано: 18 июн. 2009
Источник: redhat
CVSS2: 6.5
EPSS Критический

Описание

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=508646nagios: remote code execution via statuswml.cgi CGI script

EPSS

Процентиль: 100%
0.933
Критический

6.5 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 16 лет назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

nvd
больше 16 лет назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

debian
больше 16 лет назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execut ...

github
почти 4 года назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

EPSS

Процентиль: 100%
0.933
Критический

6.5 Medium

CVSS2