The perform_request function in /lib/echor/backplane.rb in echor 0.1.6 Ruby Gem allows local users to inject arbitrary code by adding a semi-colon in their username or password.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/01/31/10 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-02-02 21:29
Updated : 2024-02-28 16:25
NVD link : CVE-2014-1834
Mitre link : CVE-2014-1834
CVE.ORG link : CVE-2014-1834
JSON object : View
Products Affected
echor_project
- echor
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')