CVE-2008-7313

The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands. NOTE: this issue exists dues to an incomplete fix for CVE-2008-4796.
References
Link Resource
http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27 Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/09/11 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/16/10 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/18/2 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/68776 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1121497 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/94737 Third Party Advisory VDB Entry
https://rhn.redhat.com/errata/RHSA-2017-0211.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0212.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0213.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0214.html Patch Third Party Advisory
https://security.gentoo.org/glsa/201702-26 Patch Third Party Advisory VDB Entry
https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264 Third Party Advisory
http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27 Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/09/11 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/16/10 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/18/2 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/68776 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1121497 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/94737 Third Party Advisory VDB Entry
https://rhn.redhat.com/errata/RHSA-2017-0211.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0212.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0213.html Patch Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2017-0214.html Patch Third Party Advisory
https://security.gentoo.org/glsa/201702-26 Patch Third Party Advisory VDB Entry
https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:snoopy:snoopy:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-03-31 16:59

Updated : 2025-04-20 01:37


NVD link : CVE-2008-7313

Mitre link : CVE-2008-7313

CVE.ORG link : CVE-2008-7313


JSON object : View

Products Affected

nagios

  • nagios

snoopy

  • snoopy

redhat

  • openstack
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')