Vulnerability Name:

CVE-2008-4796 (CCN-46068)

Assigned:2008-10-23
Published:2008-10-23
Updated:2021-09-30
Summary:The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-78
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-4796

Source: JVN
Type: Third Party Advisory, VDB Entry
JVN#20502807

Source: JVNDB
Type: Third Party Advisory, VDB Entry
JVNDB-2008-000074

Source: CCN
Type: MSA-09-0003
Vulnerability in Snoopy 1.2.3

Source: CCN
Type: SA32361
Snoopy "_httpsrequest()" Shell Command Execution Vulnerability

Source: SECUNIA
Type: Third Party Advisory
32361

Source: CCN
Type: Snoopy Web page
Snoopy

Source: CONFIRM
Type: Broken Link, Patch, Third Party Advisory
http://sourceforge.net/forum/forum.php?forum_id=879959

Source: CCN
Type: SourceForge.net: Files
Snoopy, File Release Notes and Changelog, Release Name: Snoopy-1.2.4

Source: CCN
Type: Moodle Tracker Web site
MDL-17110

Source: DEBIAN
Type: Third Party Advisory
DSA-1691

Source: DEBIAN
Type: Third Party Advisory
DSA-1871

Source: DEBIAN
Type: DSA-1691
moodle -- several vulnerabilities

Source: DEBIAN
Type: DSA-1871
wordpress -- several vulnerabilities

Source: CCN
Type: IBM Security Bulletin T1024264 (PowerKVM)
Vulnerabilities in nagios affect PowerKVM

Source: CCN
Type: IBM Security Bulletin T1026031 (PowerKVM)
Vulnerabilities in nagios affect PowerKVM

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20081101 CVE-2008-4796: snoopy triage

Source: CCN
Type: OSVDB ID: 49261
Snoopy _httpsrequest() Function Arbitrary Shell Command Injection

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20080907 xoops-1.3.10 shell command execute vulnerability ( causing snoopy class )

Source: BID
Type: Patch, Third Party Advisory, VDB Entry
31887

Source: CCN
Type: BID-31887
Snoopy '_httpsrequest()' Arbitrary Command Execution Vulnerability

Source: CCN
Type: USN-791-1
Moodle vulnerabilities

Source: VUPEN
Type: Third Party Advisory
ADV-2008-2901

Source: XF
Type: Third Party Advisory, VDB Entry
snoopy-snoopyclass-command-execution(46068)

Source: XF
Type: UNKNOWN
snoopy-snoopyclass-command-execution(46068)

Source: GENTOO
Type: Third Party Advisory
GLSA-201702-26

Source: CONFIRM
Type: Third Party Advisory
https://www.nagios.org/projects/nagios-core/history/4x/

Vulnerable Configuration:Configuration 1:
  • cpe:/a:snoopy_project:snoopy:*:*:*:*:*:*:*:* (Version <= 1.2.3)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:nagios:nagios:*:*:*:*:*:*:*:* (Version < 4.2.2)

  • Configuration 4:
  • cpe:/a:wordpress:wordpress:*:*:*:*:*:*:*:* (Version < 2.6.3)

  • Configuration CCN 1:
  • cpe:/a:snoopy:snoopy:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.7.5:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.7.4:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.7.2:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.6.5:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.6.4:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.6.6:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:snoopy:snoopy:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.8.5:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.6.7:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.8.6:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.8.7:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.7.6:*:*:*:*:*:*:*
  • OR cpe:/a:moodle:moodle:1.6.8:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04:*:lts:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:3.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:113010
    P
    nagios-4.4.6-2.5 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:106456
    P
    Security update for ruby2.5 (Important)
    2021-12-01
    oval:org.mitre.oval:def:13687
    P
    USN-791-1 -- moodle vulnerabilities
    2014-07-07
    oval:org.mitre.oval:def:20060
    P
    DSA-1691-1 moodle - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:12947
    P
    DSA-1871-2 wordpress -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:13072
    P
    DSA-1871-1 wordpress -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:7939
    P
    DSA-1691 moodle -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:8072
    P
    DSA-1871 wordpress -- several vulnerabilities
    2014-06-23
    oval:org.debian:def:1871
    V
    several vulnerabilities
    2009-08-23
    oval:org.debian:def:1691
    V
    several vulnerabilities
    2008-12-22
    BACK
    snoopy_project snoopy *
    debian debian linux 4.0
    debian debian linux 5.0
    nagios nagios *
    wordpress wordpress *
    snoopy snoopy 1.2
    moodle moodle 1.6.2
    moodle moodle 1.7.1
    moodle moodle 1.8.3
    moodle moodle 1.7.5
    moodle moodle 1.7.4
    moodle moodle 1.7.3
    moodle moodle 1.7.2
    moodle moodle 1.6.5
    moodle moodle 1.6.4
    moodle moodle 1.6.3
    moodle moodle 1.6.1
    moodle moodle 1.6
    moodle moodle 1.7
    moodle moodle 1.6.6
    moodle moodle 1.8.4
    snoopy snoopy 1.2.3
    moodle moodle 1.8.2
    moodle moodle 1.8.5
    moodle moodle 1.6.7
    moodle moodle 1.9.2
    moodle moodle 1.9.1
    moodle moodle 1.9
    moodle moodle 1.8.1
    moodle moodle 1.8
    moodle moodle 1.8.6
    moodle moodle 1.9.3
    moodle moodle 1.8.7
    moodle moodle 1.7.6
    moodle moodle 1.6.8
    debian debian linux 4.0
    canonical ubuntu 8.04
    debian debian linux 5.0
    ibm powerkvm 2.1
    ibm powerkvm 3.1