cbrPager before 0.9.17 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a (1) ZIP (aka .cbz) or (2) RAR (aka .cbr) archive filename.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.jcoppens.com/soft/cbrpager/log.en.php | release notes |
http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 | broken link exploit |
http://www.vupen.com/english/advisories/2008/1693/references | vdb entry broken link |
http://security.gentoo.org/glsa/glsa-200806-05.xml | third party advisory vendor advisory |
http://sourceforge.net/forum/forum.php?forum_id=827120 | patch broken link |
https://bugzilla.redhat.com/show_bug.cgi?id=448285 | issue tracking third party advisory |
http://sourceforge.net/project/shownotes.php?release_id=601538&group_id=119647 | patch |
http://secunia.com/advisories/30417 | broken link third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 | vdb entry third party advisory |
http://secunia.com/advisories/30438 | broken link third party advisory vendor advisory |
http://secunia.com/advisories/30701 | third party advisory broken link |