First published: Thu Oct 27 2005(Updated: )
The _httpsrequest function in Snoopy 1.2, as used in products such as (1) MagpieRSS, (2) WordPress, (3) Ampache, and (4) Jinzora, allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTPS URL to an SSL protected web page, which is not properly handled by the fetch function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Snoopy project Snoopy | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3330 is considered a critical vulnerability due to the potential for command execution by remote attackers.
To mitigate CVE-2005-3330, update the Snoopy library to a version that is not affected or apply relevant patches.
CVE-2005-3330 affects multiple software products including MagpieRSS, WordPress, Ampache, and Jinzora that use Snoopy 1.2.
Yes, CVE-2005-3330 can allow an attacker to execute arbitrary commands, which may lead to complete system compromise.
While many applications have been updated, CVE-2005-3330 remains a threat in legacy systems that still utilize the vulnerable version of Snoopy.