CVE-2013-2642
Published Mar 18, 2014
Last updated 11 years ago
Overview
- Description
- Sophos Web Appliance before 3.7.8.2 allows (1) remote attackers to execute arbitrary commands via shell metacharacters in the client-ip parameter to the Block page, when using the user_workstation variable in a customized template, and remote authenticated users to execute arbitrary commands via shell metacharacters in the (2) url parameter to the Diagnostic Tools functionality or (3) entries parameter to the Local Site List functionality.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-78
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sophos:web_appliance_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A72A59D-1018-43D3-B7E8-53F0AA013C18", "versionEndIncluding": "3.7.8.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sophos:web_appliance:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37CBAA36-B58B-4D52-B674-E795290D42EE" } ], "operator": "OR" } ], "operator": "AND" } ]