CVE-2007-3010

masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action.
Configurations

Configuration 1 (hide)

cpe:2.3:a:al-enterprise:omnipcx_enterprise_communication_server:*:*:*:*:*:*:*:*

History

12 Dec 2024, 19:30

Type Values Removed Values Added
References (SECUNIA) http://secunia.com/advisories/26853 - Broken Link, Vendor Advisory () http://secunia.com/advisories/26853 - Broken Link, Vendor Advisory
References (OSVDB) http://osvdb.org/40521 - Broken Link () http://osvdb.org/40521 - Broken Link
References (FULLDISC) http://marc.info/?l=full-disclosure&m=119002152126755&w=2 - Exploit, Mailing List () http://marc.info/?l=full-disclosure&m=119002152126755&w=2 - Exploit, Mailing List
References (BUGTRAQ) http://www.securityfocus.com/archive/1/479699/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/479699/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://www1.alcatel-lucent.com/psirt/statements/2007002/OXEUMT.htm - Broken Link () http://www1.alcatel-lucent.com/psirt/statements/2007002/OXEUMT.htm - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/36632 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/36632 - Third Party Advisory, VDB Entry
References (MISC) http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php - Broken Link () http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2007/3185 - Broken Link () http://www.vupen.com/english/advisories/2007/3185 - Broken Link
References (BID) http://www.securityfocus.com/bid/25694 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/25694 - Broken Link, Third Party Advisory, VDB Entry

02 Jul 2024, 17:43

Type Values Removed Values Added
First Time Al-enterprise
Al-enterprise omnipcx Enterprise Communication Server
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 9.8
CWE CWE-20 NVD-CWE-noinfo
CPE cpe:2.3:a:alcatel-lucent:omnipcx:7.1:*:enterprise:*:*:*:*:* cpe:2.3:a:al-enterprise:omnipcx_enterprise_communication_server:*:*:*:*:*:*:*:*
References (OSVDB) http://osvdb.org/40521 - (OSVDB) http://osvdb.org/40521 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/36632 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/36632 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/26853 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/26853 - Broken Link, Vendor Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/479699/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/479699/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://www1.alcatel-lucent.com/psirt/statements/2007002/OXEUMT.htm - (CONFIRM) http://www1.alcatel-lucent.com/psirt/statements/2007002/OXEUMT.htm - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2007/3185 - (VUPEN) http://www.vupen.com/english/advisories/2007/3185 - Broken Link
References (BID) http://www.securityfocus.com/bid/25694 - (BID) http://www.securityfocus.com/bid/25694 - Broken Link, Third Party Advisory, VDB Entry
References (FULLDISC) http://marc.info/?l=full-disclosure&m=119002152126755&w=2 - Exploit (FULLDISC) http://marc.info/?l=full-disclosure&m=119002152126755&w=2 - Exploit, Mailing List
References (MISC) http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php - (MISC) http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php - Broken Link

Information

Published : 2007-09-18 21:17

Updated : 2025-04-03 20:40


NVD link : CVE-2007-3010

Mitre link : CVE-2007-3010


JSON object : View

Products Affected

al-enterprise

  • omnipcx_enterprise_communication_server