Vulnerability CVE-2013-7050


Published: 2013-12-13

Description:
The get_main_source_dir function in scripts/uscan.pl in devscripts before 2.13.8, when using USCAN_EXCLUSION, allows remote attackers to execute arbitrary commands via shell metacharacters in a directory name.

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Devscripts devel team -> Devscripts 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=1040266
http://seclists.org/oss-sec/2013/q4/470
http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=91f05b5
http://xforce.iss.net/xforce/xfdb/89666
http://www.securityfocus.com/bid/64241
http://seclists.org/oss-sec/2013/q4/486
http://osvdb.org/100855
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849

Copyright 2024, cxsecurity.com

 

Back to Top