SWORD: Shell command injection Insufficient input checking in SWORD may allow shell command injection. sword 2008-03-03 2008-03-03 210754 remote 1.5.8-r2 1.5.8-r2

SWORD is a library for Bible study software.

Dan Dennison reported that the diatheke.pl script used in SWORD does not properly sanitize shell meta-characters in the "range" parameter before processing it.

A remote attacker could provide specially crafted input to a vulnerable application, possibly resulting in the remote execution of arbitrary shell commands with the privileges of the user running SWORD (generally the web server account).

There is no known workaround at this time.

All SWORD users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-text/sword-1.5.8-r2"
CVE-2008-0932 rbu p-y p-y