Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2005-3330 — Improper Input Validation in Snoopy
Severity
7.5HIGHNVD
EPSS
23.8%
top 3.98%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 27
Latest updateMay 1
Description
The _httpsrequest function in Snoopy 1.2, as used in products such as (1) MagpieRSS, (2) WordPress, (3) Ampache, and (4) Jinzora, allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTPS URL to an SSL protected web page, which is not properly handled by the fetch function.
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages2 packages
🔴Vulnerability Details
1💥Exploits & PoCs
1📋Vendor Advisories
1Debian▶
CVE-2005-3330: wordpress - The _httpsrequest function in Snoopy 1.2, as used in products such as (1) Magpie...↗2005
💬Community
1Bugzilla▶
CVE-2008-7313 CVE-2014-5008 CVE-2014-5009 snoopy: incomplete fixes for command execution flaws↗2014-07-21