CVE-2011-10017
CRITICALSnort Report <1.3.2 - RCE
Title source: llmDescription
Snort Report versions < 1.3.2 contains a remote command execution vulnerability in the nmap.php and nbtscan.php scripts. These scripts fail to properly sanitize user input passed via the target GET parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and can result in full compromise of the underlying system.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/17947
metasploit
WORKING POC
EXCELLENT
by Paul Rascagneres · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/snortreport_exec.rb
References (4)
Scores
CVSS v4
10.0
EPSS
0.6351
EPSS Percentile
98.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (1)
Symmetrix Technologies/Snort Report
< 1.3.2
Published
Aug 13, 2025
Tracked Since
Feb 18, 2026