Name | CVE-2018-9246 |
Description | The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 900942 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libpgobject-util-dbadmin-perl (PTS) | bullseye | 1.4.0-1 | fixed |
bookworm | 1.6.1-1 | fixed | |
sid, trixie | 1.6.2-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libpgobject-util-dbadmin-perl | source | (unstable) | 0.130.1-1 | 900942 |
[stretch] - libpgobject-util-dbadmin-perl <no-dsa> (Minor issue)
https://github.com/ledgersmb/PGObject-Util-DBAdmin/commit/2c25c3dbc8b832a657247d3ea63ae80f3c5df6b1
https://github.com/ledgersmb/PGObject-Util-DBAdmin/commit/f4e684008ca9e182833a70793ae91288d2c80218
https://github.com/ledgersmb/PGObject-Util-DBAdmin/commit/dc48d0e1af0dbf861779b2c781e0f4c612c22cfb
https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html