Vulnerability Details : CVE-2005-3330
The _httpsrequest function in Snoopy 1.2, as used in products such as (1) MagpieRSS, (2) WordPress, (3) Ampache, and (4) Jinzora, allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTPS URL to an SSL protected web page, which is not properly handled by the fetch function.
Products affected by CVE-2005-3330
- cpe:2.3:a:snoopy:snoopy:1.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-3330
21.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-3330
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2005-3330
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-3330
-
http://www.osvdb.org/20316
-
http://www.vupen.com/english/advisories/2005/2202
Vendor Advisory
-
http://secunia.com/advisories/17455
Vendor Advisory
-
http://www.securityfocus.com/bid/15213
-
http://secunia.com/advisories/17330
-
https://svn.ampache.org/branches/3.3.1/docs/CHANGELOG
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/22874
-
http://sourceforge.net/project/shownotes.php?release_id=368750
-
http://secunia.com/advisories/17779
Vendor Advisory
-
http://securityreason.com/securityalert/117
-
http://marc.info/?l=bugtraq&m=113028858316430&w=2
-
http://marc.info/?l=bugtraq&m=113062897231412&w=2
-
http://www.vupen.com/english/advisories/2005/2335
Vendor Advisory
-
http://www.vupen.com/english/advisories/2005/2727
Vendor Advisory
-
http://secunia.com/advisories/17887
Vendor Advisory
-
http://securitytracker.com/id?1015104
-
http://sourceforge.net/project/shownotes.php?release_id=375385
Jump to