CVE-2008-4796
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
Published
2008-10-30T20:56:54.770
Last Modified
2025-04-09T00:30:58.490
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 10.0 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
10.0
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://jvn.jp/en/jp/JVN20502807/index.html
Third Party Advisory, VDB Entry
([email protected])
-
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html
Third Party Advisory, VDB Entry
([email protected])
-
http://secunia.com/advisories/32361
Third Party Advisory
([email protected])
-
http://sourceforge.net/forum/forum.php?forum_id=879959
Broken Link, Patch, Third Party Advisory
([email protected])
-
http://www.debian.org/security/2008/dsa-1691
Third Party Advisory
([email protected])
-
http://www.debian.org/security/2009/dsa-1871
Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2008/11/01/1
Mailing List, Third Party Advisory
([email protected])
-
http://www.securityfocus.com/archive/1/496068/100/0/threaded
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/31887
Patch, Third Party Advisory, VDB Entry
([email protected])
-
http://www.vupen.com/english/advisories/2008/2901
Third Party Advisory
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/46068
Third Party Advisory, VDB Entry
([email protected])
-
https://security.gentoo.org/glsa/201702-26
Third Party Advisory
([email protected])
-
https://www.nagios.org/projects/nagios-core/history/4x/
Third Party Advisory
([email protected])
-
http://jvn.jp/en/jp/JVN20502807/index.html
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/32361
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://sourceforge.net/forum/forum.php?forum_id=879959
Broken Link, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2008/dsa-1691
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2009/dsa-1871
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2008/11/01/1
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/archive/1/496068/100/0/threaded
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/31887
Patch, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2008/2901
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/46068
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.gentoo.org/glsa/201702-26
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.nagios.org/projects/nagios-core/history/4x/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)