Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-3366

Опубликовано: 03 июл. 2012
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 9

Описание

The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with root access to the client to execute arbitrary commands via shell metacharacters in the UUID field to the server process (bcfg2-server). This is very similar to a flaw discovered last year in a large number of other plugins; this instance was not fixed at that time because Trigger uses a different method to invoke external shell commands, and because Trigger previously hid all errors from trigger scripts, so tests did not find the issue. As a side effect of this change, Trigger will begin reporting errors from triggered scripts. This only affects the Trigger plugin; if you are not using Trigger, you are not affected by this flaw. As a workaround, you can disable Trigger until you are able to upgrade."

РелизСтатусПримечание
devel

not-affected

hardy

ignored

end of life
lucid

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

not-affected

1.2.2-1ubuntu2
quantal

not-affected

raring

not-affected

saucy

not-affected

upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 81%
0.01624
Низкий

9 Critical

CVSS2

Связанные уязвимости

nvd
больше 13 лет назад

The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with root access to the client to execute arbitrary commands via shell metacharacters in the UUID field to the server process (bcfg2-server).

debian
больше 13 лет назад

The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers ...

github
больше 3 лет назад

The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with root access to the client to execute arbitrary commands via shell metacharacters in the UUID field to the server process (bcfg2-server).

EPSS

Процентиль: 81%
0.01624
Низкий

9 Critical

CVSS2