The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.
References
Link | Resource |
---|---|
https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-06-08T01:00:00
Updated: 2018-06-08T00:57:01
Reserved: 2018-04-03T00:00:00
Link: CVE-2018-9246
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-06-08T01:29:02.170
Modified: 2018-08-01T16:00:26.653
Link: CVE-2018-9246
JSON object: View
Redhat Information
No data.
CWE