[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-7050Date: (C)2013-12-27   (M)2023-12-22


The get_main_source_dir function in scripts/uscan.pl in devscripts before 2.13.8, when using USCAN_EXCLUSION, allows remote attackers to execute arbitrary commands via shell metacharacters in a directory name.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 8.6
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
OSVDB-100855
BID-64241
http://seclists.org/oss-sec/2013/q4/470
http://seclists.org/oss-sec/2013/q4/486
devscripts-cve20137050-command-execution(89666)
http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git%3Ba=commitdiff%3Bh=91f05b5
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849
https://bugzilla.redhat.com/show_bug.cgi?id=1040266

CPE    8
cpe:/a:devscripts_devel_team:devscripts:2.13.0
cpe:/a:devscripts_devel_team:devscripts:2.13.3
cpe:/a:devscripts_devel_team:devscripts:2.13.4
cpe:/a:devscripts_devel_team:devscripts:2.13.1
...
CWE    1
CWE-94
OVAL    1
oval:org.secpod.oval:def:106265

© SecPod Technologies