Awesome spawn contains OS command injection vulnerability, which allows execution of additional commands passed to Awesome spawn as arguments, e.g. AwesomeSpawn.run(‘ls’,:params => {‘-l’ => ";touch haxored"}). If untrusted input was included in command arguments, attacker could use this flaw to execute arbitrary command. References: https://rubysec.com/advisories/CVE-2014-0156/ https://github.com/ManageIQ/awesome_spawn/commit/e524f85f1c6e292ef7d117d7818521307ac269ff
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2014-0156