CVE-2014-0233

Red Hat OpenShift Enterprise 2.0 and 2.1 and OpenShift Origin allow remote authenticated users to execute arbitrary commands via shell metacharacters in a directory name that is referenced by a cartridge using the file: URI scheme.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 02:01

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2014-0529.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2014-0529.html - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2014-0530.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2014-0530.html - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1096955 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=1096955 - Exploit

Information

Published : 2014-11-16 11:59

Updated : 2024-11-21 02:01


NVD link : CVE-2014-0233

Mitre link : CVE-2014-0233

CVE.ORG link : CVE-2014-0233


JSON object : View

Products Affected

redhat

  • openshift
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')