First published: Thu Feb 21 2008(Updated: )
Description of problem: The Diatheke CGI allows arbitrary command execution in the context of the webserver, e.g. www-data by simply abusing the range parameter. For example, &range=`yes` will consume tons of resources on the affected webserver. Escalation of privleges and command shells are left as an exercise to the reader. From Debian: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=466449">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=466449</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1 | |
Debian | =3.1-r1 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Debian | =4.0 | |
Fedora | =7 | |
Fedora | =8 | |
the SWORD Project | <=1.5.9 | |
Sword | <=1.5.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0932 is classified as a high severity vulnerability due to its potential for arbitrary command execution on the web server.
To fix CVE-2008-0932, update the affected versions of Diatheke CGI and the SWORD Project software to the latest secure versions.
CVE-2008-0932 affects versions of Diatheke Front End and Sword up to 1.5.9.
CVE-2008-0932 is a command injection vulnerability that allows an attacker to execute arbitrary commands on the server.
Yes, CVE-2008-0932 can potentially lead to privilege escalation, allowing attackers to gain higher access rights on the affected server.