IPFire versions prior to 2.29 (Core Update 198) containĀ a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the 'nobody' user via the BE_NAME parameter when installing a blacklist. When a blacklist is installed the application issues an HTTP POST to /cgi-bin/urlfilter.cgi and interpolates the value of BE_NAME directly into a shell invocation without appropriate sanitation. Crafted input can inject shell metacharacters, leading to arbitrary command execution in the context of the 'nobody' user.
References
| Link | Resource |
|---|---|
| https://bugzilla.ipfire.org/show_bug.cgi?id=13887 | Issue Tracking Third Party Advisory |
| https://www.ipfire.org/blog/ipfire-2-29-core-update-198-released | Release Notes |
| https://www.vulncheck.com/advisories/ipfire-command-injection-via-url-filter-blacklist | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-28 15:16
Updated : 2025-11-03 17:02
NVD link : CVE-2025-34312
Mitre link : CVE-2025-34312
CVE.ORG link : CVE-2025-34312
JSON object : View
Products Affected
ipfire
- ipfire
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
