Vulnerability Description
XCloner Standalone 3.5 and earlier, when enable_db_backup and sql_mem are enabled, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the dbbackup_comp parameter in a generate action to index2.php. NOTE: it is not clear whether this issue crosses privilege boundaries, since administrators might already have the privileges to execute code. NOTE: this can be leveraged by remote attackers using CVE-2014-2579.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xcloner | Xcloner | <= 3.5 |
Related Weaknesses (CWE)
References
- http://www.exploit-db.com/exploits/32790Exploit
- http://www.securityfocus.com/archive/1/531780/100/0/threaded
- https://www.htbridge.com/advisory/HTB23207Exploit
- http://www.exploit-db.com/exploits/32790Exploit
- http://www.securityfocus.com/archive/1/531780/100/0/threaded
- https://www.htbridge.com/advisory/HTB23207Exploit
FAQ
What is CVE-2014-2996?
CVE-2014-2996 is a vulnerability with a CVSS score of 7.1 (HIGH). XCloner Standalone 3.5 and earlier, when enable_db_backup and sql_mem are enabled, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the dbbackup_com...
How severe is CVE-2014-2996?
CVE-2014-2996 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-2996?
Check the references section above for vendor advisories and patch information. Affected products include: Xcloner Xcloner.