Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-1815

Опубликовано: 26 мар. 2015
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.

It was found that setroubleshoot did not sanitize file names supplied in a shell command look-up for RPMs associated with access violation reports. An attacker could use this flaw to escalate their privileges on the system by supplying a specially crafted file to the underlying shell command.

Дополнительная информация

Статус:

Important
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=1203352setroubleshoot: command injection via crafted file name

EPSS

Процентиль: 97%
0.36469
Средний

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.

nvd
больше 10 лет назад

The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.

github
больше 3 лет назад

The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.

oracle-oval
больше 10 лет назад

ELSA-2015-0729: setroubleshoot security update (IMPORTANT)

fstec
больше 10 лет назад

Уязвимость системы контроля доступа SELinux, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 97%
0.36469
Средний

6.8 Medium

CVSS2