First published: Sat Dec 07 2013(Updated: )
`lib/sup/message_chunks.rb` in Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the content_type of an email attachment.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Supmua Sup | <=0.13.2 | |
Supmua Sup | =0.13.0 | |
Supmua Sup | =0.13.1 | |
Supmua Sup | =0.14.0 | |
Supmua Sup | =0.14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4479 has a moderate severity level due to its potential for remote code execution through email attachments.
To fix CVE-2013-4479, upgrade Sup to version 0.13.2.1 or 0.14.1.1 or later.
The affected versions of Sup are all versions before 0.13.2.1 and 0.14.x before 0.14.1.1.
Yes, CVE-2013-4479 can be exploited remotely via malicious email attachments.
CVE-2013-4479 is associated with command injection attacks using shell metacharacters in email content types.