On 10/07/2010 02:13 AM, aero wrote:
Hello,

My company's security team found a security flaws in opsview. even for 3.9.0

Someone can execute shell command via URL( ex.
http://opsviewurl/cgi-nmis/admin.pl?admin=ping&node=10.10.10.10
<http://opsviewurl/cgi-nmis/admin.pl?admin=ping&node=10.10.10.10> | ls -l )

Please fix it.

Thank you.


Hello [email protected]

As distressing as it is to see this well-known type of vulnerability in 2010, people do make mistakes and software will always have flaws in it.

You do a service by reporting this. Thank you,

That said, I hope that you considered whether posting it to a public forum without giving the vendor an opportunity to fix it was the correct choice for the community. I see no indication in your posting that you notified Opsera and they were unresponsive, so I'm guessing that didn't happen?

If you considered this, and believe you made an ethical choice, fine, I won't argue with you. I'm just asking you to be mindful before hitting send in public.

Sincerely,
John Coleman
_______________________________________________
Opsview-users mailing list
[email protected]
http://lists.opsview.org/lists/listinfo/opsview-users

Reply via email to