Vulnerability Details : CVE-2017-1000009
Akeneo PIM CE and EE <1.6.6, <1.5.15, <1.4.28 are vulnerable to shell injection in the mass edition, resulting in remote execution.
Products affected by CVE-2017-1000009
- cpe:2.3:a:akeneo:product_information_management:1.4.0:-:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.0:beta1:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.0:beta2:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.0:beta3:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.0:rc1:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.1:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.2:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.3:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.4:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.5:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.6:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.7:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.8:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.9:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.10:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.11:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.12:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.13:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.14:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.15:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.16:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.17:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.18:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.19:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.20:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.21:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.22:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.23:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.24:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.25:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.26:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.27:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.0:-:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.0:alpha1:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.0:beta1:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.0:rc1:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.1:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.2:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.3:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.4:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.5:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.6:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.7:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.8:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.9:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.10:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.11:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.12:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.13:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.14:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.0:-:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.0:alpha1:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.0:alpha2:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.0:rc1:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.1:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.2:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.3:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.4:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.5:*:*:*:enterprise:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.0:-:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.0:beta1:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.0:beta2:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.0:beta3:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.0:rc1:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.1:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.2:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.3:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.4:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.5:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.6:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.7:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.8:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.9:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.10:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.11:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.12:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.13:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.14:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.15:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.16:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.17:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.18:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.19:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.20:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.21:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.22:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.23:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.24:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.25:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.26:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.4.27:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.0:-:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.0:alpha1:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.0:beta1:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.0:rc1:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.1:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.2:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.3:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.4:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.5:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.6:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.7:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.8:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.9:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.10:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.11:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.12:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.13:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.5.14:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.0:-:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.0:alpha1:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.0:alpha2:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.0:rc1:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.1:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.2:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.3:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.4:*:*:*:community:*:*:*
- cpe:2.3:a:akeneo:product_information_management:1.6.5:*:*:*:community:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-1000009
11.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-1000009
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-1000009
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-1000009
-
https://github.com/akeneo/pim-community-dev/blob/master/CHANGELOG-1.4.md#bug-fixes
Page not found · GitHub · GitHubPatch;Release Notes;Third Party Advisory
-
https://github.com/akeneo/pim-community-dev/blob/master/CHANGELOG-1.6.md#bug-fixes-2
Page not found · GitHub · GitHubRelease Notes;Patch;Third Party Advisory
-
https://github.com/akeneo/pim-community-dev/blob/1.5/CHANGELOG-1.5.md#bug-fixes-2
Page not found · GitHub · GitHubPatch;Release Notes;Third Party Advisory
Jump to