The Square Squash allows remote attackers to execute arbitrary code via a YAML document in the (1) namespace parameter to the deobfuscation function or (2) sourcemap parameter to the sourcemap function in app/controllers/api/v1_controller.rb.
References
Configurations
History
21 Nov 2024, 01:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/ - | |
References | () http://osvdb.org/95992 - | |
References | () http://www.exploit-db.com/exploits/27530 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/86335 - | |
References | () https://github.com/SquareSquash/web/commit/6d667c19e96e4f23dccbfbe24afeebd18e98e1c5 - Exploit, Patch |
Information
Published : 2014-05-27 14:55
Updated : 2024-11-21 01:56
NVD link : CVE-2013-5036
Mitre link : CVE-2013-5036
CVE.ORG link : CVE-2013-5036
JSON object : View
Products Affected
squash
- square_squash
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')