CVE-2009-1525 (GCVE-0-2009-1525)
Vulnerability from cvelistv5 – Published: 2009-05-05 20:00 – Updated: 2024-08-07 05:13
VLAI?
Summary
CMD_DB in JBMC Software DirectAdmin before 1.334 allows remote authenticated users to gain privileges via shell metacharacters in the name parameter during a restore action.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:13:25.646Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "54015",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/54015"
},
{
"name": "20090422 DirectAdmin \u003c 1.33.4 Local file overwrite \u0026 Local root escalation",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0228.html"
},
{
"name": "directadmin-cmddb-command-execution(50167)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50167"
},
{
"name": "34861",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34861"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.directadmin.com/features.php?id=968"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-04-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "CMD_DB in JBMC Software DirectAdmin before 1.334 allows remote authenticated users to gain privileges via shell metacharacters in the name parameter during a restore action."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "54015",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/54015"
},
{
"name": "20090422 DirectAdmin \u003c 1.33.4 Local file overwrite \u0026 Local root escalation",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0228.html"
},
{
"name": "directadmin-cmddb-command-execution(50167)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50167"
},
{
"name": "34861",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34861"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.directadmin.com/features.php?id=968"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-1525",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CMD_DB in JBMC Software DirectAdmin before 1.334 allows remote authenticated users to gain privileges via shell metacharacters in the name parameter during a restore action."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "54015",
"refsource": "OSVDB",
"url": "http://osvdb.org/54015"
},
{
"name": "20090422 DirectAdmin \u003c 1.33.4 Local file overwrite \u0026 Local root escalation",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0228.html"
},
{
"name": "directadmin-cmddb-command-execution(50167)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50167"
},
{
"name": "34861",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34861"
},
{
"name": "http://www.directadmin.com/features.php?id=968",
"refsource": "CONFIRM",
"url": "http://www.directadmin.com/features.php?id=968"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-1525",
"datePublished": "2009-05-05T20:00:00",
"dateReserved": "2009-05-05T00:00:00",
"dateUpdated": "2024-08-07T05:13:25.646Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.333\", \"matchCriteriaId\": \"B768ED82-8524-4A8A-8870-150B4B2070A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:0.95:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"950B6C5B-8864-4248-BFE2-3559CEBCEAD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A7A412F-D5D3-4835-B496-931867BE2F2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E9F46CD-7BCB-4230-85DE-423FD56CBB68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3E73F85-C632-4FCE-8E0E-D43057F7F2D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BF52D95-BBF9-4433-A7CA-938F663BBF8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4D38930-9C2B-4C1E-A60E-2A01751E6962\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"684EA453-9B2F-4DC6-B352-33E9FF1D059E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F667CC1-B49B-4F1D-9D7F-BA9EA0B358B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EC670D6-4E3C-4911-BD82-5615029FF7D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7AD7550-22EB-4AFB-AFEA-AEAE67DA5D22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AED4E43C-23C6-4FA7-BE9E-F2B680ACEDA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.07:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B871B01-7F60-42D3-A935-C8FAE964B742\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.08:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA0BCB5A-FDDD-43BB-9837-F8A99AF3C840\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.09:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6003B88-A67E-4DF3-B79A-3DA3FE4B232E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80AE9A2B-1A17-44C7-960F-6C44F54E499B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C7A40F1-8099-45A9-B583-5DCD9418EEC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A777926-1C6D-4815-9AD5-BB0187240DDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC5D92DD-3FBA-4E61-A225-4533340F5E2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E38AFB57-3C20-40F4-9B2A-48A54618A95A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"118EE3CB-8379-4596-A123-97E27E4755D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B9678BF-0C83-42B3-AF53-B5C03E876F80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6385C7C5-7FD5-482A-ADDB-A7253949D8B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"484B6212-6A45-4294-8D3C-FDAE8263FDEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EBE1E56-DD19-434B-9269-2CD4881A8CB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FD2FA1E-A4F7-4EDA-B976-6587E8FAE599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EC562EE-048A-49D7-9F1B-A2BA6ABB30AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C845A416-F58A-4ADB-81E9-A873052CD9CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64BDDF62-9CBC-4AB7-BEBC-0FABDC4DF2F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01B46A2D-7333-497C-90D8-C73088682C87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7336ABAE-8274-478F-9807-BF6F622D2805\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C414DDF6-95B8-469B-B604-94B9C585EAAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1020F89-5184-4786-8506-C049213522F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E83CBC81-74F8-4880-8BF8-A248C2978329\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81656A6B-A30A-415E-8212-FDE8A4BE7F14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBC6DA4C-4EA7-4A34-999F-E6EEA1187A31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.081:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59A80A97-600A-4014-BE17-3704AF17EB10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.111:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FCAC483-220A-4A77-9947-DF9364038889\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.121:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE419366-9394-4CA7-A55B-AFE4581E9784\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.151:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D135322-8410-485D-8D08-26C3D1E5F28D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.152:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16A5AE38-893B-41E3-951F-3D5816F57865\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.161:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"620907FD-D1E8-4B49-BA15-6CBDA20A3CAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.171:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B468D79-6AFA-404F-AB78-321A3C0FF2D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.172:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C014925-8D2A-463B-8241-27DE59117325\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.173:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7CCC9CF-40B0-4B21-BA39-2F426566DC41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.174:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B979554A-1BC6-4E10-A293-A173D2A99954\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.181:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11D32A32-5E67-43E3-B4B9-A0688894FC5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.192:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E172E4C-02EF-441D-9D24-32CC2757A0F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.193:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48430BB0-0012-4C99-ACB8-7F20FE211763\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.195:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79F416BB-FB79-4F47-BC40-6B6FB4A689FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.196:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAEF5026-014D-4BCB-AC71-D70B09B8B98A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.201:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64A68763-3A6E-4B6D-AAB0-8052D8020C7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.202:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F8D00D6-C972-4474-8DE8-CF37F2E371ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.203:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F136A16-A7C7-4A83-8D4D-BB8ADEDCA25E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.204:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B969866-0DA1-4FF6-B481-8294368D2465\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.205:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C21BD781-F02C-499D-85CD-AF95B76F5267\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.206:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"085694D2-F999-4054-AE4F-13E75E1670CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.207:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D49B376-0F3E-4DC4-B132-F28670A0EEED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.211:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9540CD99-37B0-433C-BD6B-76CF4B7A4039\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.212:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"968B35D0-89FD-4442-8F58-A2737091293E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.213:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"483AE214-5602-4B41-B516-20328C5F728C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.221:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DF4CD9C-A504-4B42-8341-76DD11B8BE09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.222:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AA2F0D1-66AE-43B1-A864-86EAB01AE0B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.223:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A3761B7-DA83-40A6-AAF1-7FD7F9012C6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.224:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C69A38A8-434F-490F-8ACD-8C9707F90C72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.225:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAD23827-F6DE-4687-86C1-835C788D3CA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.226:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93A8E1AC-6AB9-4CDC-B1F1-B120B8F11F44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.231:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B681B118-70C1-476C-9251-64643D9CF200\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.232:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEEBBCB1-7D88-4E02-BC36-D88A5B2DEFF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.233:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBA16933-AAC0-4DE2-8860-8991ED65D207\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.234:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B4851D2-8EBE-4520-A1DF-379F78F1FFEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.235:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"149F2DE3-9D5A-42FE-A7FF-EFE4106BE471\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.241:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C780A435-BB3E-4990-85D7-94E48A11D9B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.242:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2F3F4ED-ED64-4147-B24E-D9E019321097\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.243:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A178CCE4-3880-42C4-BE11-6F8E7766B35C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.244:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D083974F-1533-4E1C-A7AD-C3217987783F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.251:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"497D4932-C82B-40CE-8A6A-CA3874964C8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.252:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F19AF8A4-F9B6-4256-A079-9BD44BE44EED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.253:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B724438-B83B-43D2-B9F3-2967EE51D860\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.254:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39E4EA93-CA34-462B-BD57-5388906331E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.255:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0D5DDB1-5E2B-4EB8-B883-21302FEC0574\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.261:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"423D2B7B-F50C-43FA-8CAB-320D0E8CC327\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.262:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E5EA035-B7C1-4D2C-8D54-40F51CC385B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.263:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D56B6FC1-662A-4F65-A4DF-D83FDC3B8A19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.264:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03E7ABAC-E97D-48F5-B279-922675D7A46F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.265:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9486749-DA99-4937-8F24-4BA75DD131FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.266:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D034435F-401F-47E7-A9AC-9A803C289F92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.273:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0879D0C9-D397-4EFA-96D3-F6923966AA6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.274:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9582E5D-6924-4707-91B0-F395121A5F93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.275:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"701FDD8C-B7C9-43D0-AE06-BEFFD3A7822E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.281:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C86CB562-1BDE-4238-8C88-F1D735BAC6E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.282:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC755D99-DA7E-4590-B747-A6EAFE7EE872\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.285:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15F969FE-243B-4015-84FF-E3490BAC0BED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.286:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D93E5BF7-6E1B-474C-AABF-71FC548CB828\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.291:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A23A9476-A56F-4D60-9F04-645B16840A55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.292:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"154CC305-820A-4079-85A2-2C6E3AE26598\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.293:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E98D3D2-C999-4134-B34D-7278E52C8385\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.294:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82D70C90-4D03-423B-B499-EB368049A5BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.295:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDE26A64-F441-4724-99AF-4D94D741B070\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.296:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD0E5D29-A3B7-49A6-AC4E-38F0233611EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.297:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF7F89C-D4DD-4058-9A9F-B7B976DFAB47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.301:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD6B81BC-A032-4964-8F13-C485F160DE9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.302:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D49EFEB2-1F4B-4CA7-A082-20F41B980987\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.311:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75726460-6DB3-48B7-B984-46F45953FEFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.312:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B4D90A0-46AF-4D3C-8601-23AAE919AC95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.313:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"199447EB-E134-42C7-B4D4-3A89A50F2CC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.314:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54E4AF59-9EBE-495E-936B-EED2BC213919\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.315:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEBB2E15-C99F-4293-AB93-51987A476068\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.321:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0188D54-45F0-4F35-8A73-76D90777C9A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.322:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B233AFD7-DFD0-4D28-8109-95E913918F08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.323:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7C36E7E-6D3A-4222-A35F-E72B9DA2191C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.331:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4900B370-4CF1-4E77-BDBD-374BAA01C61B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.332:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9C9E06A-39E6-4062-AB43-559396829107\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.1741:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57313039-6B37-4DF9-85F0-77B97F187AF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jbmc-software:directadmin:1.1941:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36F381A8-406E-46DB-9276-7E4284BFA44A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"CMD_DB in JBMC Software DirectAdmin before 1.334 allows remote authenticated users to gain privileges via shell metacharacters in the name parameter during a restore action.\"}, {\"lang\": \"es\", \"value\": \"CMD_DB en JBMC Software DirectAdmin anterior a v1.334 permite a usuarios remotos autenticados conseguir privilegios a trav\\u00e9s de metacaracteres del interprete de comandos en el par\\u00e1metro \\\"name\\\" durante una acci\\u00f3n \\\"restore\\\".\"}]",
"id": "CVE-2009-1525",
"lastModified": "2024-11-21T01:02:40.183",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:C/I:C/A:C\", \"baseScore\": 8.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 6.8, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2009-05-05T20:30:00.280",
"references": "[{\"url\": \"http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0228.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://osvdb.org/54015\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/34861\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.directadmin.com/features.php?id=968\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/50167\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0228.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://osvdb.org/54015\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/34861\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.directadmin.com/features.php?id=968\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/50167\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-1525\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-05-05T20:30:00.280\",\"lastModified\":\"2025-12-16T21:04:43.900\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"CMD_DB in JBMC Software DirectAdmin before 1.334 allows remote authenticated users to gain privileges via shell metacharacters in the name parameter during a restore action.\"},{\"lang\":\"es\",\"value\":\"CMD_DB en JBMC Software DirectAdmin anterior a v1.334 permite a usuarios remotos autenticados conseguir privilegios a trav\u00e9s de metacaracteres del interprete de comandos en el par\u00e1metro \\\"name\\\" durante una acci\u00f3n \\\"restore\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:C/I:C/A:C\",\"baseScore\":8.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":6.8,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:directadmin:directadmin:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.33.4\",\"matchCriteriaId\":\"A460BFF8-D494-41FB-950E-F74A37A81D36\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0228.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Broken Link\"]},{\"url\":\"http://osvdb.org/54015\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34861\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.directadmin.com/features.php?id=968\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\",\"Release Notes\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/50167\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0228.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Broken Link\"]},{\"url\":\"http://osvdb.org/54015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34861\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.directadmin.com/features.php?id=968\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\",\"Release Notes\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/50167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…