CVE-2011-10017

CRITICAL

Snort Report <1.3.2 - RCE

Title source: llm

Description

Snort Report versions < 1.3.2 contains a remote command execution vulnerability in the nmap.php and nbtscan.php scripts. These scripts fail to properly sanitize user input passed via the target GET parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and can result in full compromise of the underlying system.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/17947
metasploit WORKING POC EXCELLENT
by Paul Rascagneres · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/snortreport_exec.rb

Scores

CVSS v4 10.0
EPSS 0.6351
EPSS Percentile 98.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-78
Status published
Products (1)
Symmetrix Technologies/Snort Report < 1.3.2
Published Aug 13, 2025
Tracked Since Feb 18, 2026