OS Command Injection Affecting wordpress package, versions <2.5.1-9
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-WORDPRESS-362949
- published 30 Oct 2008
- disclosed 30 Oct 2008
Introduced: 30 Oct 2008
CVE-2008-4796 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
wordpress
to version 2.5.1-9 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream wordpress
package and not the wordpress
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
References
- https://security-tracker.debian.org/tracker/CVE-2008-4796
- http://www.securityfocus.com/archive/1/496068/100/0/threaded
- http://sourceforge.net/forum/forum.php?forum_id=879959
- https://www.nagios.org/projects/nagios-core/history/4x/
- http://www.debian.org/security/2008/dsa-1691
- http://www.debian.org/security/2009/dsa-1871
- https://security.gentoo.org/glsa/201702-26
- http://jvn.jp/en/jp/JVN20502807/index.html
- http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html
- http://www.openwall.com/lists/oss-security/2008/11/01/1
- http://secunia.com/advisories/32361
- http://www.securityfocus.com/bid/31887
- http://www.vupen.com/english/advisories/2008/2901
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46068