Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0233

Опубликовано: 21 мая 2014
Источник: redhat
CVSS2: 7.2

Описание

Red Hat OpenShift Enterprise 2.0 and 2.1 and OpenShift Origin allow remote authenticated users to execute arbitrary commands via shell metacharacters in a directory name that is referenced by a cartridge using the file: URI scheme.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Enterprise 1rubygem-openshift-origin-nodeAffected
Red Hat OpenShift Enterprise 2.0rubygem-openshift-origin-nodeFixedRHSA-2014:052921.05.2014
Red Hat OpenShift Enterprise 2.1rubygem-openshift-origin-nodeFixedRHSA-2014:053021.05.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-73->CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1096955OpenShift: downloadable cartridge source url file command execution as root

7.2 High

CVSS2

Связанные уязвимости

nvd
около 11 лет назад

Red Hat OpenShift Enterprise 2.0 and 2.1 and OpenShift Origin allow remote authenticated users to execute arbitrary commands via shell metacharacters in a directory name that is referenced by a cartridge using the file: URI scheme.

github
больше 3 лет назад

Red Hat OpenShift Enterprise 2.0 and 2.1 and OpenShift Origin allow remote authenticated users to execute arbitrary commands via shell metacharacters in a directory name that is referenced by a cartridge using the file: URI scheme.

7.2 High

CVSS2