CVE-2025-50974

The Calamaris log exporter CGI (/cgi-bin/logs.cgi/calamaris.dat) in IPFire 2.29 does not properly sanitize user-supplied input before incorporating parameter values into a shell command. An unauthenticated remote attacker can inject arbitrary OS commands by embedding shell metacharacters in any of the following parameters BYTE_UNIT, DAY_BEGIN, DAY_END, HIST_LEVEL, MONTH_BEGIN, MONTH_END, NUM_CONTENT, NUM_DOMAINS, NUM_HOSTS, NUM_URLS, PERF_INTERVAL, YEAR_BEGIN, YEAR_END.
Configurations

No configuration.

History

27 Aug 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-78
Summary
  • (es) El CGI del exportador de registros de Calamaris (/cgi-bin/logs.cgi/calamaris.dat) en IPFire 2.29 no depura correctamente la entrada proporcionada por el usuario antes de incorporar valores de parĂ¡metros en un comando de shell. Un atacante remoto no autenticado puede inyectar comandos arbitrarios del sistema operativo incrustando metacaracteres de shell en cualquiera de los siguientes parĂ¡metros: BYTE_UNIT, DAY_BEGIN, DAY_END, HIST_LEVEL, MONTH_BEGIN, MONTH_END, NUM_CONTENT, NUM_DOMAINS, NUM_HOSTS, NUM_URLS, PERF_INTERVAL, YEAR_BEGIN, YEAR_END.

26 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-26 17:15

Updated : 2025-08-29 16:22


NVD link : CVE-2025-50974

Mitre link : CVE-2025-50974

CVE.ORG link : CVE-2025-50974


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')