| Summary: |
CVE-2014-0156 awesome_spawn: OS command injection vulnerability |
| Product: |
[Other] Security Response
|
Reporter: |
Pedro Sampaio <psampaio> |
| Component: |
vulnerability | Assignee: |
Red Hat Product Security <security-response-team> |
| Status: |
CLOSED
NOTABUG
|
QA Contact: |
|
| Severity: |
medium
|
Docs Contact: |
|
| Priority: |
medium
|
|
|
| Version: |
unspecified | CC: |
akarol, dmetzger, gmccullo, gtanzill, jfrey, jhardy, obarenbo, roliveri, simaishi, smallamp
|
| Target Milestone: |
--- | Keywords: |
Security |
| Target Release: |
--- | |
|
| Hardware: |
All | |
|
| OS: |
Linux | |
|
| Whiteboard: |
|
|
Fixed In Version:
|
awesome_spawn 1.20, awesome_spawn 1.3.0
|
Doc Type:
|
No Doc Update
|
|
Doc Text:
|
|
Story Points:
|
---
|
|
Clone Of:
|
|
Environment:
|
|
|
Last Closed:
|
2022-06-30 22:05:57 UTC
|
Type:
|
---
|
|
Regression:
|
---
|
Mount Type:
|
---
|
|
Documentation:
|
---
|
CRM:
|
|
|
Verified Versions:
|
|
Category:
|
---
|
|
oVirt Team:
|
---
|
RHEL 7.3 requirements from Atomic Host:
|
|
|
Cloudforms Team:
|
---
|
Target Upstream Version:
|
|
|
Embargoed:
|
|
| |
Awesome spawn contains OS command injection vulnerability, which allows execution of additional commands passed to Awesome spawn as arguments, e.g. AwesomeSpawn.run(‘ls’,:params => {‘-l’ => ";touch haxored"}). If untrusted input was included in command arguments, attacker could use this flaw to execute arbitrary command. References: https://rubysec.com/advisories/CVE-2014-0156/ https://github.com/ManageIQ/awesome_spawn/commit/e524f85f1c6e292ef7d117d7818521307ac269ff