The Calamaris log exporter CGI (/cgi-bin/logs.cgi/calamaris.dat) in IPFire 2.29 does not properly sanitize user-supplied input before incorporating parameter values into a shell command. An unauthenticated remote attacker can inject arbitrary OS commands by embedding shell metacharacters in any of the following parameters BYTE_UNIT, DAY_BEGIN, DAY_END, HIST_LEVEL, MONTH_BEGIN, MONTH_END, NUM_CONTENT, NUM_DOMAINS, NUM_HOSTS, NUM_URLS, PERF_INTERVAL, YEAR_BEGIN, YEAR_END.
References
| Link | Resource |
|---|---|
| https://github.com/4rdr/proofs/blob/main/info/IPFire-2.29-Command-Injection.md | Exploit |
Configurations
History
No history.
Information
Published : 2025-08-26 17:15
Updated : 2025-09-09 18:56
NVD link : CVE-2025-50974
Mitre link : CVE-2025-50974
CVE.ORG link : CVE-2025-50974
JSON object : View
Products Affected
ipfire
- ipfire
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
