CVE-2008-4796
Feed2JS File Disclosure
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
La función _httpsrequest function (Snoopy/Snoopy.class.php) en Snoopy 1.2.3 y versiones anteriores, cuando es usada en (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost y posiblemente otros productos, permite a atacantes remotos ejecutar comandos arbitrarios a través de metacarácteres shell en URLs https.
Feed2JS uses MagpieRSS for parsing the feeds, and MagpieRSS uses Snoopy library for fetching the documents. The version of Snoopy in use suffers from a local file disclosure vulnerability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-10-30 CVE Reserved
- 2008-10-30 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://jvn.jp/en/jp/JVN20502807/index.html | Third Party Advisory | |
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html | Third Party Advisory | |
http://secunia.com/advisories/32361 | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2008/11/01/1 | Mailing List | |
http://www.securityfocus.com/archive/1/496068/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2008/2901 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46068 | Third Party Advisory | |
https://www.nagios.org/projects/nagios-core/history/4x | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://sourceforge.net/forum/forum.php?forum_id=879959 | 2021-09-30 | |
http://www.securityfocus.com/bid/31887 | 2021-09-30 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2008/dsa-1691 | 2021-09-30 | |
http://www.debian.org/security/2009/dsa-1871 | 2021-09-30 | |
https://security.gentoo.org/glsa/201702-26 | 2021-09-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Snoopy Project Search vendor "Snoopy Project" | Snoopy Search vendor "Snoopy Project" for product "Snoopy" | <= 1.2.3 Search vendor "Snoopy Project" for product "Snoopy" and version " <= 1.2.3" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
| ||||||
Nagios Search vendor "Nagios" | Nagios Search vendor "Nagios" for product "Nagios" | < 4.2.2 Search vendor "Nagios" for product "Nagios" and version " < 4.2.2" | - |
Affected
| ||||||
Wordpress Search vendor "Wordpress" | Wordpress Search vendor "Wordpress" for product "Wordpress" | < 2.6.3 Search vendor "Wordpress" for product "Wordpress" and version " < 2.6.3" | - |
Affected
|