The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154427.html | vendor-advisory x_refsource_FEDORA |
| http://www.securityfocus.com/bid/73374 | vdb-entry x_refsource_BID |
| https://www.exploit-db.com/exploits/36564/ | exploit x_refsource_EXPLOIT-DB |
| http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154444.html | vendor-advisory x_refsource_FEDORA |
| http://www.openwall.com/lists/oss-security/2015/03/26/1 | mailing-list x_refsource_MLIST |
| https://bugzilla.redhat.com/show_bug.cgi?id=1206050 | x_refsource_CONFIRM |
| http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154147.html | vendor-advisory x_refsource_FEDORA |
| http://rhn.redhat.com/errata/RHSA-2015-0729.html | vendor-advisory x_refsource_REDHAT |
| http://www.osvdb.org/119966 | vdb-entry x_refsource_OSVDB |
| https://github.com/stealth/troubleshooter | x_refsource_MISC |
| https://bugzilla.redhat.com/show_bug.cgi?id=1203352 | x_refsource_CONFIRM |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|