OS Command Injection - CVE-2012-3366
Published: July 3, 2012 / Updated: August 3, 2020
Vulnerability identifier: #VU33117
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2012-3366
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor:
Affected software:
Detailed vulnerability description
The vulnerability allows a remote #AU# to execute arbitrary code.
The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with root access to the client to execute arbitrary commands via shell metacharacters in the UUID field to the server process (bcfg2-server).
How to mitigate CVE-2012-3366
Install update from vendor's website.
Sources
- http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539
- http://secunia.com/advisories/49629
- http://secunia.com/advisories/49690
- http://www.debian.org/security/2012/dsa-2503
- http://www.securityfocus.com/bid/54217
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76616
- https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be