CVE-2013-5036

The Square Squash allows remote attackers to execute arbitrary code via a YAML document in the (1) namespace parameter to the deobfuscation function or (2) sourcemap parameter to the sourcemap function in app/controllers/api/v1_controller.rb.
Configurations

Configuration 1 (hide)

cpe:2.3:a:squash:square_squash:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:56

Type Values Removed Values Added
References () http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/ - () http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/ -
References () http://osvdb.org/95992 - () http://osvdb.org/95992 -
References () http://www.exploit-db.com/exploits/27530 - Exploit () http://www.exploit-db.com/exploits/27530 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/86335 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/86335 -
References () https://github.com/SquareSquash/web/commit/6d667c19e96e4f23dccbfbe24afeebd18e98e1c5 - Exploit, Patch () https://github.com/SquareSquash/web/commit/6d667c19e96e4f23dccbfbe24afeebd18e98e1c5 - Exploit, Patch

Information

Published : 2014-05-27 14:55

Updated : 2024-11-21 01:56


NVD link : CVE-2013-5036

Mitre link : CVE-2013-5036

CVE.ORG link : CVE-2013-5036


JSON object : View

Products Affected

squash

  • square_squash
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')