Vulnerability Details : CVE-2014-8517
Public exploit exists!
The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.
Exploit prediction scoring system (EPSS) score for CVE-2014-8517
95.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-8517
-
tnftp "savefile" Arbitrary Command Execution
Disclosure Date: 2014-10-28First seen: 2020-04-26exploit/unix/http/tnftp_savefileThis module exploits an arbitrary command execution vulnerability in tnftp's handling of the resolved output filename - called "savefile" in the source - from a requested resource. If tnftp is executed without the -o command-line option, it will resolve the
CVSS scores for CVE-2014-8517
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-8517
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-8517
-
https://www.exploit-db.com/exploits/43112/
tnftp - 'savefile' Arbitrary Command Execution (Metasploit) - Unix remote Exploit
-
http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html
openSUSE-SU-2014:1383-1: moderate: tnftp: Prevent command exection
-
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Apple - Lists.apple.com
-
http://seclists.org/oss-sec/2014/q4/459
oss-sec: ftp(1) can be made execute arbitrary commands by malicious webserver
-
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc
Patch;Vendor Advisory
-
https://security.gentoo.org/glsa/201611-05
tnftp: Arbitrary code execution (GLSA 201611-05) — Gentoo security
-
http://support.apple.com/HT204244
About the security content of OS X Yosemite v10.10.2 and Security Update 2015-001 - Apple Support
-
http://seclists.org/oss-sec/2014/q4/464
oss-sec: Re: ftp(1) can be made execute arbitrary commands by malicious webserver
Products affected by CVE-2014-8517
- cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.9.5:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*