- Description
- The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with root access to the client to execute arbitrary commands via shell metacharacters in the UUID field to the server process (bcfg2-server).
- Source
- secalert@redhat.com
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
- nvd@nist.gov
- CWE-78
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anl:bcfg2:1.2.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BFEC6B25-9318-4304-B66D-B1C3E734A7ED"
},
{
"criteria": "cpe:2.3:a:anl:bcfg2:1.2.0:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "17868C9C-72E4-4BC2-BCEC-A97DD6CBFE08"
}
],
"operator": "OR"
}
]
}
]