First published: Tue Jun 17 2014(Updated: )
cartridge_repository.rb in OpenShift Origin and Enterprise 1.2.8 through 2.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a Source-Url ending with a (1) .tar.gz, (2) .zip, (3) .tgz, or (4) .tar file extension in a cartridge manifest file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | =1.2.8 | |
Red Hat OpenShift | =2.0 | |
Red Hat OpenShift | =2.0.1 | |
Red Hat OpenShift | =2.0.2 | |
Red Hat OpenShift | =2.0.3 | |
Red Hat OpenShift | =2.0.4 | |
Red Hat OpenShift | =2.0.5 | |
Red Hat OpenShift | =2.0.6 | |
Red Hat OpenShift | =2.1 | |
Red Hat OpenShift | =2.1.1 | |
Red Hat OpenShift Origin | =1.2.8 | |
Red Hat OpenShift Origin | =2.1 | |
Red Hat OpenShift Origin | =2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3496 has been assigned a high severity rating due to the potential for remote command execution.
To fix CVE-2014-3496, upgrade to a patched version of OpenShift Origin or Enterprise that addresses this vulnerability.
CVE-2014-3496 affects OpenShift Origin and Enterprise versions 1.2.8 through 2.1.1.
CVE-2014-3496 is a remote command execution vulnerability caused by improper handling of shell metacharacters in source URLs.
CVE-2014-3496 was reported by Jeremy Choi from Red Hat.