[Japanese]
|
JVNDB-2008-000074
|
Snoopy command injection vulnerability
|
Snoopy, a PHP library contains a command injection vulnerability.
Snoopy is an open source PHP library. Snoopy does not properly handle user-input data. This causes a vulnerability which may allow a remote attacker to execute an arbitrary command.
Takeshi Terada of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V2 Severity: Base Metrics 5.1 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: High
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: Partial
- Availability Impact: Partial
|
|
Snoopy
Usagi Project
- MyNETS 1.2.0.1 and earlier
- MyNETS 1.1.1+20081020 and earlier
- MyNETS 1.1.0+20081020 and earlier
- MyNETS 1.0.1+20081020 and earlier
- MyNETS 1.0.0+20081020 and earlier
|
|
An arbitrary command could be executed with the privilege of the server where Snoopy runs.
|
[Update the Software]
Apply the latest update provided by the developer.
|
Snoopy
Usagi Project
- PRESS archives : 54 (Japanese)
|
- OS Command Injection(CWE-78) [IPA Evaluation]
|
- CVE-2008-4796
|
- JVN : JVN#20502807
- National Vulnerability Database (NVD) : CVE-2008-4796
- Secunia Advisory : 32361
- FrSIRT Advisories : FrSIRT/ADV-2008-2901
- JVN iPedia (Japanese) : JVNDB-2008-000074
|
- [2008/10/28]
Web page published
[2008/11/28]
Affected Products : Added Usagi Project(54).
Vendor Information : Added Usagi Project(54).
|