eventapp/lib/gcloud.rb in the ISUCON5 qualifier portal (aka eventapp) web application before 2015-10-30 makes improper popen calls, which allows remote attackers to execute arbitrary commands via an HTTP request that includes shell metacharacters in an argument to a "gcloud compute" command.
References
Configurations
History
21 Nov 2024, 02:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN04281281/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000175 - Vendor Advisory | |
References | () https://github.com/isucon/isucon5-qualify/commit/150e3e6d851acb31a0b15ce93380a7dab14203fa - | |
References | () https://github.com/isucon/isucon5-qualify/pull/5 - |
Information
Published : 2015-11-04 03:59
Updated : 2024-11-21 02:33
NVD link : CVE-2015-5673
Mitre link : CVE-2015-5673
CVE.ORG link : CVE-2015-5673
JSON object : View
Products Affected
isucon
- isucon_5_qualifier_eventapp
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')