Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-13051

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-09 Oct, 2019 | 11:49
Updated At-04 Aug, 2024 | 23:41
Rejected At-
Credits

Pi-Hole 4.3 allows Command Injection.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:09 Oct, 2019 | 11:49
Updated At:04 Aug, 2024 | 23:41
Rejected At:
▼CVE Numbering Authority (CNA)

Pi-Hole 4.3 allows Command Injection.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://pi-hole.net/blog/
x_refsource_MISC
https://github.com/pi-hole/pi-hole/commits/master
x_refsource_MISC
https://pi-hole.net/2019/09/21/pi-hole-4-3-2-release-notes/
x_refsource_MISC
https://github.com/pi-hole/AdminLTE/pull/974
x_refsource_MISC
Hyperlink: https://pi-hole.net/blog/
Resource:
x_refsource_MISC
Hyperlink: https://github.com/pi-hole/pi-hole/commits/master
Resource:
x_refsource_MISC
Hyperlink: https://pi-hole.net/2019/09/21/pi-hole-4-3-2-release-notes/
Resource:
x_refsource_MISC
Hyperlink: https://github.com/pi-hole/AdminLTE/pull/974
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://pi-hole.net/blog/
x_refsource_MISC
x_transferred
https://github.com/pi-hole/pi-hole/commits/master
x_refsource_MISC
x_transferred
https://pi-hole.net/2019/09/21/pi-hole-4-3-2-release-notes/
x_refsource_MISC
x_transferred
https://github.com/pi-hole/AdminLTE/pull/974
x_refsource_MISC
x_transferred
Hyperlink: https://pi-hole.net/blog/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/pi-hole/pi-hole/commits/master
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://pi-hole.net/2019/09/21/pi-hole-4-3-2-release-notes/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/pi-hole/AdminLTE/pull/974
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:09 Oct, 2019 | 12:15
Updated At:11 Oct, 2019 | 15:27

Pi-Hole 4.3 allows Command Injection.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 6.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

pi-hole
pi-hole
>>pi-hole>>4.3
cpe:2.3:a:pi-hole:pi-hole:4.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
CWE ID: CWE-78
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/pi-hole/AdminLTE/pull/974cve@mitre.org
Third Party Advisory
https://github.com/pi-hole/pi-hole/commits/mastercve@mitre.org
Patch
Third Party Advisory
https://pi-hole.net/2019/09/21/pi-hole-4-3-2-release-notes/cve@mitre.org
Release Notes
Vendor Advisory
https://pi-hole.net/blog/cve@mitre.org
Release Notes
Vendor Advisory
Hyperlink: https://github.com/pi-hole/AdminLTE/pull/974
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://github.com/pi-hole/pi-hole/commits/master
Source: cve@mitre.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://pi-hole.net/2019/09/21/pi-hole-4-3-2-release-notes/
Source: cve@mitre.org
Resource:
Release Notes
Vendor Advisory
Hyperlink: https://pi-hole.net/blog/
Source: cve@mitre.org
Resource:
Release Notes
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

105Records found

CVE-2021-24033
Matching Score-4
Assigner-Meta Platforms, Inc.
ShareView Details
Matching Score-4
Assigner-Meta Platforms, Inc.
CVSS Score-5.6||MEDIUM
EPSS-1.44% / 79.91%
||
7 Day CHG~0.00%
Published-09 Mar, 2021 | 00:25
Updated-03 Aug, 2024 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

Action-Not Available
Vendor-Facebook
Product-react-dev-utilsreact-dev-utils
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-23326
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-6.3||MEDIUM
EPSS-1.50% / 80.40%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 12:30
Updated-17 Sep, 2024 | 02:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Command Injection

This affects the package @graphql-tools/git-loader before 6.2.6. The use of exec and execSync in packages/loaders/git/src/load-git.ts allows arbitrary command injection.

Action-Not Available
Vendor-the-guildn/a
Product-graphql-tools@graphql-tools/git-loader
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-21372
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.3||HIGH
EPSS-1.12% / 77.33%
||
7 Day CHG~0.00%
Published-26 Mar, 2021 | 21:20
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nimble arbitrary code execution for specially crafted package metadata

Nimble is a package manager for the Nim programming language. In Nim release version before versions 1.2.10 and 1.4.4, Nimble doCmd is used in different places and can be leveraged to execute arbitrary commands. An attacker can craft a malicious entry in the packages.json package list to trigger code execution.

Action-Not Available
Vendor-nim-langnim-lang
Product-nimsecurity
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-6736
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-8.8||HIGH
EPSS-1.93% / 82.62%
||
7 Day CHG~0.00%
Published-03 Jun, 2019 | 18:07
Updated-04 Aug, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay 23.0.10.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of tiscript. When processing the System.Exec method the application does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7234.

Action-Not Available
Vendor-Bitdefender
Product-safepaySafePay
CWE ID-CWE-356
Product UI does not Warn User of Unsafe Actions
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2015-5958
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-40.68% / 97.27%
||
7 Day CHG~0.00%
Published-31 Aug, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

phpFileManager 0.9.8 allows remote attackers to execute arbitrary commands via a crafted URL.

Action-Not Available
Vendor-phpfilemanager_projectn/a
Product-phpfilemanagern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found