First published: Fri Oct 31 2008(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2008-4796">CVE-2008-4796</a> to the following vulnerability: The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs. NOTE: some of these details are obtained from third party information. References: <a href="http://sourceforge.net/forum/forum.php?forum_id=879959">http://sourceforge.net/forum/forum.php?forum_id=879959</a> <a href="http://jvn.jp/en/jp/JVN20502807/index.html">http://jvn.jp/en/jp/JVN20502807/index.html</a> <a href="http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html">http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html</a> <a href="http://www.frsirt.com/english/advisories/2008/2901">http://www.frsirt.com/english/advisories/2008/2901</a> <a href="http://secunia.com/advisories/32361">http://secunia.com/advisories/32361</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Snoopy project Snoopy | <=1.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-469320 is classified with a high severity due to the potential for remote code execution.
To mitigate REDHAT-BUG-469320, upgrade Snoopy to version 1.2.4 or later.
REDHAT-BUG-469320 addresses a remote code execution vulnerability found in the _httpsrequest function of Snoopy 1.2.3 and earlier.
Any system using Snoopy version 1.2.3 or earlier is affected by REDHAT-BUG-469320.
If exploited, REDHAT-BUG-469320 allows attackers to execute arbitrary code on the vulnerable system.