Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 02 Jul 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 02 Jul 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process. | |
| Title | stamparm/maltrail <=0.54 Remote Command Execution | |
| Weaknesses | CWE-306 CWE-78 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-20T13:44:08.933Z
Reserved: 2025-04-15T19:15:22.550Z
Link: CVE-2025-34073
Updated: 2025-07-02T20:30:03.253Z
Status : Awaiting Analysis
Published: 2025-07-02T14:15:24.967
Modified: 2025-07-03T15:13:53.147
Link: CVE-2025-34073
No data.
OpenCVE Enrichment
No data.