8.8

CVE-2025-34312

IPFire versions prior to 2.29 (Core Update 198) contain a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the 'nobody' user via the BE_NAME parameter when installing a blacklist. When a blacklist is installed the application issues an HTTP POST to /cgi-bin/urlfilter.cgi and interpolates the value of BE_NAME directly into a shell invocation without appropriate sanitation. Crafted input can inject shell metacharacters, leading to arbitrary command execution in the context of the 'nobody' user.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
IpfireIpfire Version < 2.29
IpfireIpfire Version2.29 Updatecore_update183
IpfireIpfire Version2.29 Updatecore_update184
IpfireIpfire Version2.29 Updatecore_update185
IpfireIpfire Version2.29 Updatecore_update186
IpfireIpfire Version2.29 Updatecore_update187
IpfireIpfire Version2.29 Updatecore_update188
IpfireIpfire Version2.29 Updatecore_update189
IpfireIpfire Version2.29 Updatecore_update190
IpfireIpfire Version2.29 Updatecore_update191
IpfireIpfire Version2.29 Updatecore_update192
IpfireIpfire Version2.29 Updatecore_update193
IpfireIpfire Version2.29 Updatecore_update194
IpfireIpfire Version2.29 Updatecore_update195
IpfireIpfire Version2.29 Updatecore_update196
IpfireIpfire Version2.29 Updatecore_update197
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.47% 0.64
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
disclosure@vulncheck.com 8.7 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.