IPFire versions prior to 2.29 (Core Update 198) containĀ a command injection vulnerability that allows an authenticated attacker to execute arbitrary commands as the user 'nobody' via multiple parameters when creating a Proxy report. When a user creates a Proxy report the application issues an HTTP POST to /cgi-bin/logs.cgi/calamaris.dat and reads the values of DAYBEGIN, MONTHBEGIN, YEARBEGIN, DAYEND, MONTHEND, YEAREND, NUMDOMAINS, PERFINTERVAL, NUMCONTENT, HISTLEVEL, NUMHOSTS, NUMURLS, and BYTE_UNIT, which are interpolated directly into the shell invocation of the mkreport helper. Because these parameters are never sanitized for improper characters or constructs, a crafted POST can inject shell metacharacters into one or more fields, causing arbitrary commands to run with the privileges of the 'nobody' user.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-34311.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.29"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update183"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update184"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update185"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update186"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update187"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update188"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update189"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update190"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update191"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update192"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update193"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update194"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update195"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update196"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.29-core_update197"
}
]
}
]