CVE-2015-5673

eventapp/lib/gcloud.rb in the ISUCON5 qualifier portal (aka eventapp) web application before 2015-10-30 makes improper popen calls, which allows remote attackers to execute arbitrary commands via an HTTP request that includes shell metacharacters in an argument to a "gcloud compute" command.
Configurations

Configuration 1 (hide)

cpe:2.3:a:isucon:isucon_5_qualifier_eventapp:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:33

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN04281281/index.html - Vendor Advisory () http://jvn.jp/en/jp/JVN04281281/index.html - Vendor Advisory
References () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000175 - Vendor Advisory () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000175 - Vendor Advisory
References () https://github.com/isucon/isucon5-qualify/commit/150e3e6d851acb31a0b15ce93380a7dab14203fa - () https://github.com/isucon/isucon5-qualify/commit/150e3e6d851acb31a0b15ce93380a7dab14203fa -
References () https://github.com/isucon/isucon5-qualify/pull/5 - () https://github.com/isucon/isucon5-qualify/pull/5 -

Information

Published : 2015-11-04 03:59

Updated : 2024-11-21 02:33


NVD link : CVE-2015-5673

Mitre link : CVE-2015-5673

CVE.ORG link : CVE-2015-5673


JSON object : View

Products Affected

isucon

  • isucon_5_qualifier_eventapp
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')