Description
Snort Report versions < 1.3.2 contains a remote command execution vulnerability in the nmap.php and nbtscan.php scripts. These scripts fail to properly sanitize user input passed via the target GET parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and can result in full compromise of the underlying system.
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
* before 1.3.2
Credits
Paul Rascagneres
References
raw.githubusercontent.com/.../multi/http/snortreport_exec.rb
www.exploit-db.com/exploits/17947
web.archive.org/....symmetrixtech.com/articles/news-016.html
www.vulncheck.com/advisories/snort-report-rce