Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3593

Опубликовано: 14 окт. 2014
Источник: redhat
CVSS2: 5.2
EPSS Низкий

Описание

Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration.

It was discovered that luci used eval() on inputs containing strings from the cluster configuration file when generating its web pages. An attacker with privileges to create or edit the cluster configuration could use this flaw to execute arbitrary code as the luci user on a host running luci.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=989005luci: privilege escalation through cluster with specially crafted configuration

EPSS

Процентиль: 52%
0.00295
Низкий

5.2 Medium

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration.

github
больше 3 лет назад

Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration.

EPSS

Процентиль: 52%
0.00295
Низкий

5.2 Medium

CVSS2