The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc | patch vendor advisory |
http://secunia.com/advisories/62028 | third party advisory |
https://www.exploit-db.com/exploits/43112/ | exploit |
http://seclists.org/oss-sec/2014/q4/464 | mailing list |
http://support.apple.com/HT204244 | |
https://security.gentoo.org/glsa/201611-05 | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html | vendor advisory |
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html | vendor advisory |
http://secunia.com/advisories/62260 | third party advisory |
http://seclists.org/oss-sec/2014/q4/459 | mailing list |