CVE-2012-5642Fail2ban vulnerability

5 documents5 sources
Severity
7.5HIGHNVD
EPSS
1.6%
top 17.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 31
Latest updateMay 17

Description

server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

debiandebian/fail2ban< fail2ban 0.8.6-3wheezy1 (bookworm)
Debianfail2ban/fail2ban< 0.8.6-3wheezy1+3
NVDfail2ban/fail2ban0.8.7.1+33

Patches

🔴Vulnerability Details

2
GHSA
GHSA-mxxq-p5rj-2jcc: server/action2022-05-17
OSV
CVE-2012-5642: server/action2012-12-31

📋Vendor Advisories

1
Debian
CVE-2012-5642: fail2ban - server/action.py in Fail2ban before 0.8.8 does not properly handle the content o...2012

💬Community

1
Bugzilla
CVE-2012-5642 fail2ban: does not escape the content of <matches>2012-12-17
CVE-2012-5642 — Debian Fail2ban vulnerability | cvebase