CVE-2008-4796 — OS Command Injection in Libphp-snoopy
Severity
10.0CRITICALNVD
NVD9.8
EPSS
1.1%
top 22.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 30
Latest updateMay 17
Description
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
CVSS vector
AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0
Affected Packages7 packages
Also affects: Debian Linux 4.0, 5.0
Patches
🔴Vulnerability Details
6GHSA▶
GHSA-wr36-qh3g-7h4v: The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands↗2022-05-17
GHSA▶
GHSA-828p-3vwg-wc22: MagpieRSS, as used in the front-end component in Nagios Core before 4↗2022-05-14
OSV▶
CVE-2008-7313: The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands↗2017-03-31
📋Vendor Advisories
6Debian▶
CVE-2008-4796: libphp-snoopy - The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier...↗2008
📐Framework References
1💬Community
5Bugzilla▶
CVE-2008-7313 CVE-2014-5008 CVE-2014-5009 snoopy: incomplete fixes for command execution flaws↗2014-07-21