First published: Thu Mar 13 2008(Updated: )
Richard Megginson discovered a shell command injection flaw in the Admin Server's replication monitor CGI perl script repl-monitor-cgi.pl. Script parameters were not properly sanitized prior to being passed to system() function. An attacker able to access replication monitor CGI script could execute arbitrary shell command with privileges of Admin Server. Affected versions: - Red Hat Directory Server 7.1 - Admin Server runs with root privileges - Red Hat Directory Server 8 - Admin Server runs under an unprivileged user, following users by default: - nobody on Red Hat Enterprise Linux and Solaris - daemon on HP-UX - Fedora Directory Server - Admin Server runs under an unprivileged user, nobody by default
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora Directory Server | ||
Red Hat Directory Server | =7.1 | |
Red Hat Directory Server | =8-el4 | |
Red Hat Directory Server | =8-el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0892 has a high severity rating due to the potential for remote command execution through the replication monitor CGI script.
To fix CVE-2008-0892, upgrade to the patched version of Red Hat Directory Server as recommended in security advisories.
CVE-2008-0892 affects various versions of Red Hat Fedora Directory Server and Red Hat Directory Server, specifically 7.1, 8-el4, and 8-el5.
Yes, CVE-2008-0892 can be exploited remotely by attackers with access to the replication monitor CGI script.
CVE-2008-0892 is categorized as a shell command injection vulnerability.