Snort Report versions < 1.3.2 contains a remote command execution vulnerability in the nmap.php and nbtscan.php scripts. These scripts fail to properly sanitize user input passed via the target GET parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and can result in full compromise of the underlying system.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Aug 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Snort
Snort snort |
|
Vendors & Products |
Snort
Snort snort |
Thu, 14 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 13 Aug 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Snort Report versions < 1.3.2 contains a remote command execution vulnerability in the nmap.php and nbtscan.php scripts. These scripts fail to properly sanitize user input passed via the target GET parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and can result in full compromise of the underlying system. | |
Title | Snort Report nmap.php/nbtscan.php RCE | |
Weaknesses | CWE-78 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-08-14T13:31:39.178Z
Reserved: 2025-08-13T17:43:45.259Z
Link: CVE-2011-10017

Updated: 2025-08-14T13:31:33.969Z

Status : Awaiting Analysis
Published: 2025-08-13T21:15:29.233
Modified: 2025-08-14T13:11:53.633
Link: CVE-2011-10017

No data.