Arbitrary Command Execution via Shell Metacharacters in setroubleshoot's get_rpm_nvr_by_file_path_temporary Function

Arbitrary Command Execution via Shell Metacharacters in setroubleshoot's get_rpm_nvr_by_file_path_temporary Function

CVE-2015-1815 · HIGH Severity

AV:N/AC:L/AU:N/C:C/I:C/A:C

The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.

Learn more about our Web Application Penetration Testing UK.