Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <9517e4490c27cf8693fadb3316c44c9f@tribut.de>
Date: Sun, 01 Feb 2015 14:42:20 +0100
From: Felix Eckhofer <felix@...but.de>
To: oss-security@...ts.openwall.com
Subject: Re: RCE, XSS and HTTP header injection in fli4l web interface

Hey.

Am 01.02.2015 04:05, schrieb cve-assign@...re.org:
> For the "execute arbitrary programs" issues, can you provide specific
> names for the vulnerability types, or any equivalent information?
> Examples of vulnerability types can be found on the
> https://www.owasp.org/index.php/Category:Vulnerability and
> http://cwe.mitre.org web sites.

Thank you for your response and sorry for the inaccurate description. In 
both cases user-supplied strings are used in an expression which is 
later passed to /bin/sh's eval. So I would classify both as Command 
Injection (https://www.owasp.org/index.php/Command_Injection).


Best Regards
felix

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.