CVE-2014-3496
Published Jun 20, 2014
Last updated 2 years ago
Overview
- Description
- cartridge_repository.rb in OpenShift Origin and Enterprise 1.2.8 through 2.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a Source-Url ending with a (1) .tar.gz, (2) .zip, (3) .tgz, or (4) .tar file extension in a cartridge manifest file.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift:1.2.8:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "8B150884-E0B1-419B-B085-BFA29FA880FC" }, { "criteria": "cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B497EBB1-17A4-4FE8-B9FF-B2B53B18C175" }, { "criteria": "cpe:2.3:a:redhat:openshift:2.0.1:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7405F776-4F1C-467A-AC66-5AABBE43411B" }, { "criteria": "cpe:2.3:a:redhat:openshift:2.0.2:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "437AB2B0-0175-4E48-A1A5-6723C97F3253" }, { "criteria": "cpe:2.3:a:redhat:openshift:2.0.3:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA5E9EB2-607B-43A7-A75F-CA171529B9E8" }, { "criteria": "cpe:2.3:a:redhat:openshift:2.0.4:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "582D97B4-ADBC-485D-B00F-AD9F3566F711" }, { "criteria": "cpe:2.3:a:redhat:openshift:2.0.5:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB204392-8CE0-4B3B-9399-F6B83EB9006F" }, { "criteria": "cpe:2.3:a:redhat:openshift:2.0.6:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "7D84F1EB-5654-4B52-92E3-5DA10F97CA39" }, { "criteria": "cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "AC659BB6-CD01-4F4A-BFBC-227A52ECB391" }, { "criteria": "cpe:2.3:a:redhat:openshift:2.1.1:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "A463CF4B-2010-4AB5-9275-020BF53B5FA8" }, { "criteria": "cpe:2.3:a:redhat:openshift_origin:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7EA05E8-A168-428B-A884-94FDC8FA9718" }, { "criteria": "cpe:2.3:a:redhat:openshift_origin:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22826952-47F5-4C1B-8A8B-35E089B84C0A" }, { "criteria": "cpe:2.3:a:redhat:openshift_origin:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1F656F4-7B39-4318-A231-E01C0B6ABE0C" } ], "operator": "OR" } ] } ]