CVE-2008-4796
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
30/10/2008
Last modified:
09/04/2025
Description
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:snoopy_project:snoopy:*:*:*:*:*:*:*:* | 1.2.3 (including) | |
| cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:* | 4.2.2 (excluding) | |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 2.6.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://jvn.jp/en/jp/JVN20502807/index.html
- http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html
- http://secunia.com/advisories/32361
- http://sourceforge.net/forum/forum.php?forum_id=879959
- http://www.debian.org/security/2008/dsa-1691
- http://www.debian.org/security/2009/dsa-1871
- http://www.openwall.com/lists/oss-security/2008/11/01/1
- http://www.securityfocus.com/archive/1/496068/100/0/threaded
- http://www.securityfocus.com/bid/31887
- http://www.vupen.com/english/advisories/2008/2901
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46068
- https://security.gentoo.org/glsa/201702-26
- https://www.nagios.org/projects/nagios-core/history/4x/
- http://jvn.jp/en/jp/JVN20502807/index.html
- http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html
- http://secunia.com/advisories/32361
- http://sourceforge.net/forum/forum.php?forum_id=879959
- http://www.debian.org/security/2008/dsa-1691
- http://www.debian.org/security/2009/dsa-1871
- http://www.openwall.com/lists/oss-security/2008/11/01/1
- http://www.securityfocus.com/archive/1/496068/100/0/threaded
- http://www.securityfocus.com/bid/31887
- http://www.vupen.com/english/advisories/2008/2901
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46068
- https://security.gentoo.org/glsa/201702-26
- https://www.nagios.org/projects/nagios-core/history/4x/



