VYPR
Critical severity9.8NVD Advisory· Published May 5, 2017· Updated May 13, 2026

CVE-2017-8799

CVE-2017-8799

Description

Untrusted input execution via igetwild in all iRODS versions before 4.1.11 and 4.2.1 allows other iRODS users (potentially anonymous) to execute remote shell commands via iRODS virtual pathnames. To exploit this vulnerability, a virtual iRODS pathname that includes a semicolon would be retrieved via igetwild. Because igetwild is a Bash script, the part of the pathname following the semicolon would be executed in the user's shell.

Affected products

2
  • Irods/Irods2 versions
    cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*range: <=4.1.10
    • cpe:2.3:a:irods:irods:4.2.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.