The Calamaris log exporter CGI (/cgi-bin/logs.cgi/calamaris.dat) in IPFire 2.29 does not properly sanitize user-supplied input before incorporating parameter values into a shell command. An unauthenticated remote attacker can inject arbitrary OS commands by embedding shell metacharacters in any of the following parameters BYTE_UNIT, DAY_BEGIN, DAY_END, HIST_LEVEL, MONTH_BEGIN, MONTH_END, NUM_CONTENT, NUM_DOMAINS, NUM_HOSTS, NUM_URLS, PERF_INTERVAL, YEAR_BEGIN, YEAR_END.
References
Link | Resource |
---|---|
https://github.com/4rdr/proofs/blob/main/info/IPFire-2.29-Command-Injection.md | Exploit |
Configurations
History
09 Sep 2025, 18:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/4rdr/proofs/blob/main/info/IPFire-2.29-Command-Injection.md - Exploit | |
First Time |
Ipfire ipfire
Ipfire |
|
CPE | cpe:2.3:a:ipfire:ipfire:2.29:-:*:*:*:*:*:* |
27 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-78 |
26 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-26 17:15
Updated : 2025-09-09 18:56
NVD link : CVE-2025-50974
Mitre link : CVE-2025-50974
CVE.ORG link : CVE-2025-50974
JSON object : View
Products Affected
ipfire
- ipfire
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')