ID CVE-2000-0322
Summary The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*
    cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*
    cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
    cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
CVSS
Base: 10.0 (as of 17-09-2016 - 01:59)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
redhat via4
advisories
rhsa
id RHSA-2000:014
refmap via4
bid 1149
bugtraq 20000424 piranha default password/exploit
xf piranha-passwd-execute
Last major update 17-09-2016 - 01:59
Published 24-04-2000 - 04:00
Last modified 17-09-2016 - 01:59
Back to Top