IPFire versions prior to 2.29 (Core Update 198) contain a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the user 'nobody' via multiple parameters when creating a Proxy report. When a user creates a Proxy report the application issues an HTTP POST to /cgi-bin/logs.cgi/calamaris.dat and reads the values of DAY_BEGIN, MONTH_BEGIN, YEAR_BEGIN, DAY_END, MONTH_END, YEAR_END, NUM_DOMAINS, PERF_INTERVAL, NUM_CONTENT, HIST_LEVEL, NUM_HOSTS, NUM_URLS, and BYTE_UNIT, which are interpolated directly into the shell invocation of the mkreport helper. Because these parameters are never sanitized for improper characters or constructs, a crafted POST can inject shell metacharacters into one or more fields, causing arbitrary commands to run with the privileges of the 'nobody' user.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:ipfire:ipfire:*:*:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update183:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update184:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update185:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update186:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update187:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update188:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update189:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update190:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update191:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update192:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update193:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update194:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update195:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update196:*:*:*:*:*:* cpe:2.3:a:ipfire:ipfire:2.29:core_update197:*:*:*:*:*:*  | 
|
| Metrics | 
        
        cvssV3_1
         
  | 
Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Ipfire
         Ipfire ipfire  | 
|
| Vendors & Products | 
        
        Ipfire
         Ipfire ipfire  | 
Tue, 28 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Tue, 28 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | IPFire versions prior to 2.29 (Core Update 198) contain a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the user 'nobody' via multiple parameters when creating a Proxy report. When a user creates a Proxy report the application issues an HTTP POST to /cgi-bin/logs.cgi/calamaris.dat and reads the values of DAY_BEGIN, MONTH_BEGIN, YEAR_BEGIN, DAY_END, MONTH_END, YEAR_END, NUM_DOMAINS, PERF_INTERVAL, NUM_CONTENT, HIST_LEVEL, NUM_HOSTS, NUM_URLS, and BYTE_UNIT, which are interpolated directly into the shell invocation of the mkreport helper. Because these parameters are never sanitized for improper characters or constructs, a crafted POST can inject shell metacharacters into one or more fields, causing arbitrary commands to run with the privileges of the 'nobody' user. | |
| Title | IPFire < v2.29 Command Injection via Proxy Report Creation | |
| Weaknesses | CWE-78 | |
| References | 
         | |
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-10-28T14:43:31.324Z
Updated: 2025-10-28T15:16:34.491Z
Reserved: 2025-04-15T19:15:22.583Z
Link: CVE-2025-34311
Updated: 2025-10-28T15:15:58.185Z
Status : Analyzed
Published: 2025-10-28T15:16:11.400
Modified: 2025-11-03T17:02:11.273
Link: CVE-2025-34311
No data.