IPFire versions prior to 2.29 (Core Update 198) containĀ a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the user 'nobody' via multiple parameters when creating a Proxy report. When a user creates a Proxy report the application issues an HTTP POST to /cgi-bin/logs.cgi/calamaris.dat and reads the values of DAY_BEGIN, MONTH_BEGIN, YEAR_BEGIN, DAY_END, MONTH_END, YEAR_END, NUM_DOMAINS, PERF_INTERVAL, NUM_CONTENT, HIST_LEVEL, NUM_HOSTS, NUM_URLS, and BYTE_UNIT, which are interpolated directly into the shell invocation of the mkreport helper. Because these parameters are never sanitized for improper characters or constructs, a crafted POST can inject shell metacharacters into one or more fields, causing arbitrary commands to run with the privileges of the 'nobody' user.
References
| Link | Resource |
|---|---|
| https://bugzilla.ipfire.org/show_bug.cgi?id=13886 | Issue Tracking Third Party Advisory |
| https://www.ipfire.org/blog/ipfire-2-29-core-update-198-released | Release Notes |
| https://www.vulncheck.com/advisories/ipfire-command-injection-via-proxy-report-creation | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-28 15:16
Updated : 2025-11-03 17:02
NVD link : CVE-2025-34311
Mitre link : CVE-2025-34311
CVE.ORG link : CVE-2025-34311
JSON object : View
Products Affected
ipfire
- ipfire
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
