Because of a incorrect escaped exec command in MagpieRSS in 0.72 in the /extlib/Snoopy.class.inc file, it is possible to add a extra command to the curl binary. This creates an issue on the /scripts/magpie_debug.php and /scripts/magpie_simple.php page that if you send a specific https url in the RSS URL field, you are able to execute arbitrary commands.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T21:55:12.222Z

Reserved: 2021-03-19T00:00:00

Link: CVE-2021-28940

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-02T20:15:13.317

Modified: 2024-11-21T06:00:25.163

Link: CVE-2021-28940

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.