Snoopy command injection vulnerability


Snoopy, a PHP library contains a command injection vulnerability.

Snoopy is an open source PHP library. Snoopy does not properly handle user-input data. This causes a vulnerability which may allow a remote attacker to execute an arbitrary command.

Takeshi Terada of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 5.1 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: High
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
Affected Products

  • Snoopy 1.2.3 and earlier
Usagi Project
  • MyNETS and earlier
  • MyNETS 1.1.1+20081020 and earlier
  • MyNETS 1.1.0+20081020 and earlier
  • MyNETS 1.0.1+20081020 and earlier
  • MyNETS 1.0.0+20081020 and earlier


An arbitrary command could be executed with the privilege of the server where Snoopy runs.

[Update the Software]
Apply the latest update provided by the developer.
Vendor Information

Snoopy Usagi Project
  • PRESS archives : 54 (Japanese)
CWE (What is CWE?)

  1. OS Command Injection(CWE-78) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2008-4796

  1. JVN : JVN#20502807
  2. National Vulnerability Database (NVD) : CVE-2008-4796
  3. Secunia Advisory : 32361
  4. FrSIRT Advisories : FrSIRT/ADV-2008-2901
  5. JVN iPedia (Japanese) : JVNDB-2008-000074
Revision History

  • [2008/10/28]
      Web page published
      Affected Products : Added Usagi Project(54).
      Vendor Information : Added Usagi Project(54).