[Japanese]

JVNDB-2008-000074

Snoopy command injection vulnerability

Overview

Snoopy, a PHP library contains a command injection vulnerability.

Snoopy is an open source PHP library. Snoopy does not properly handle user-input data. This causes a vulnerability which may allow a remote attacker to execute an arbitrary command.

Takeshi Terada of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 5.1 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: High
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial

Affected Products


Snoopy
  • Snoopy 1.2.3 and earlier
Usagi Project
  • MyNETS 1.2.0.1 and earlier
  • MyNETS 1.1.1+20081020 and earlier
  • MyNETS 1.1.0+20081020 and earlier
  • MyNETS 1.0.1+20081020 and earlier
  • MyNETS 1.0.0+20081020 and earlier

Impact

An arbitrary command could be executed with the privilege of the server where Snoopy runs.
Solution

[Update the Software]
Apply the latest update provided by the developer.
Vendor Information

Snoopy Usagi Project
  • PRESS archives : 54 (Japanese)
CWE (What is CWE?)

  1. OS Command Injection(CWE-78) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2008-4796
References

  1. JVN : JVN#20502807
  2. National Vulnerability Database (NVD) : CVE-2008-4796
  3. Secunia Advisory : 32361
  4. FrSIRT Advisories : FrSIRT/ADV-2008-2901
  5. JVN iPedia (Japanese) : JVNDB-2008-000074
Revision History

[2008/10/28]
  Web page published
[2008/11/28]
  Affected Products : Added Usagi Project(54).
  Vendor Information : Added Usagi Project(54).