{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "description", "text": "The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.", "title": "Vulnerability Description" } ], "publisher": { "category": "other", "contact_details": "gdt@cpan.org", "name": "giterlizzi", "namespace": "https://github.com/giterlizzi/" }, "references": [ { "category": "self", "summary": "CPANSA-PGObject-Util-DBAdmin-2018-01 JSON", "url": "https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2018/cpansa-pgobject-util-dbadmin-2018-01.json" }, { "category": "external", "summary": "https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html", "url": "https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html" }, { "category": "external", "summary": "CVE-2018-9246 (NVD)", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9246" } ], "title": "PGObject-Util-DBAdmin vulnerability", "tracking": { "current_release_date": "2018-06-18T00:00:00", "generator": { "engine": { "name": "CSAF Perl Toolkit", "version": "0.25" } }, "id": "CPANSA-PGObject-Util-DBAdmin-2018-01", "initial_release_date": "2018-06-18T00:00:00", "revision_history": [ { "date": "2018-06-18T00:00:00", "number": "1", "summary": "First release" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cpan/<1.6.0", "product": { "name": "PGObject-Util-DBAdmin less than 1.6.0", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "vers:cpan/>=1.6.0", "product": { "name": "PGObject-Util-DBAdmin greater than or equal 1.6.0", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "PGObject-Util-DBAdmin" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-9246", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "description", "text": "The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.", "title": "Vulnerability Description" } ], "product_status": { "fixed": [ "CSAFPID-0002" ], "known_affected": [ "CSAFPID-0001" ] }, "scores": [ { "cvss_v2": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }