First published: Thu Oct 30 2008(Updated: )
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Snoopy | <=1.2.3 | |
Debian | =4.0 | |
Debian | =5.0 | |
Nagios Plugins | <4.2.2 | |
WordPress | <2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4796 is classified as a high severity vulnerability due to its ability to allow remote command execution.
To fix CVE-2008-4796, you should upgrade Snoopy to version 1.2.4 or a later version, which addresses this vulnerability.
CVE-2008-4796 affects Snoopy versions up to and including 1.2.3, along with applications like Ampache, Nagios, and WordPress versions up to 2.6.3.
CVE-2008-4796 can be exploited through remote command injection attacks via specially crafted HTTPS URLs.
Yes, CVE-2008-4796 remains relevant for legacy systems and applications still using the vulnerable versions of the software.