First published: Tue Dec 18 2012(Updated: )
Michael Scherer (mscherer) reports: the file <a href="https://github.com/openshift/origin-server/blob/master/node-util/www/html/restorer.php">https://github.com/openshift/origin-server/blob/master/node-util/www/html/restorer.php</a> used to restore application after being idle fails to safely handle user supplied data that is later used on the command line.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | =1.0 | |
Red Hat OpenShift Origin | <=1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5646 has been assigned a medium severity level, indicating it requires attention but is not critical.
To fix CVE-2012-5646, update to Red Hat OpenShift 1.0.5 or a later version.
CVE-2012-5646 affects Red Hat OpenShift 1.0 and all versions of OpenShift Origin up to and including 1.0.5.
No, CVE-2012-5646 is not classified as a remote code execution vulnerability.
CVE-2012-5646 was reported in 2012.