Files
cve/2011/CVE-2011-10017.md

19 lines
1017 B
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2011-10017](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-10017)
![](https://img.shields.io/static/v1?label=Product&message=Snort%20Report&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brightgreen)
### Description
Snort Report versions < 1.3.2 contains a remote command execution vulnerability in the nmap.php and nbtscan.php scripts. These scripts fail to properly sanitize user input passed via the target GET parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and can result in full compromise of the underlying system.
### POC
#### Reference
- https://www.exploit-db.com/exploits/17947
- https://www.vulncheck.com/advisories/snort-report-rce
#### Github
No PoCs found on GitHub currently.