CVE-2025-34311
28.10.2025, 15:16
IPFire versions prior to 2.29 (Core Update 198) containa command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the user 'nobody' via multiple parameters when creating a Proxy report. When a user creates a Proxy report the application issues an HTTP POST to /cgi-bin/logs.cgi/calamaris.dat and reads the values of DAY_BEGIN, MONTH_BEGIN, YEAR_BEGIN, DAY_END, MONTH_END, YEAR_END, NUM_DOMAINS, PERF_INTERVAL, NUM_CONTENT, HIST_LEVEL, NUM_HOSTS, NUM_URLS, and BYTE_UNIT, which are interpolated directly into the shell invocation of the mkreport helper. Because these parameters are never sanitized for improper characters or constructs, a crafted POST can inject shell metacharacters into one or more fields, causing arbitrary commands to run with the privileges of the 'nobody' user.
| Vendor | Product | Version |
|---|---|---|
| ipfire | ipfire | 𝑥 < 2.29 |
| ipfire | ipfire | 2.29:core_update183 |
| ipfire | ipfire | 2.29:core_update184 |
| ipfire | ipfire | 2.29:core_update185 |
| ipfire | ipfire | 2.29:core_update186 |
| ipfire | ipfire | 2.29:core_update187 |
| ipfire | ipfire | 2.29:core_update188 |
| ipfire | ipfire | 2.29:core_update189 |
| ipfire | ipfire | 2.29:core_update190 |
| ipfire | ipfire | 2.29:core_update191 |
| ipfire | ipfire | 2.29:core_update192 |
| ipfire | ipfire | 2.29:core_update193 |
| ipfire | ipfire | 2.29:core_update194 |
| ipfire | ipfire | 2.29:core_update195 |
| ipfire | ipfire | 2.29:core_update196 |
| ipfire | ipfire | 2.29:core_update197 |
𝑥
= Vulnerable software versions