CVE-2014-1834

The perform_request function in /lib/echor/backplane.rb in echor 0.1.6 Ruby Gem allows local users to inject arbitrary code by adding a semi-colon in their username or password.
References
Link Resource
http://www.openwall.com/lists/oss-security/2014/01/31/10 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/01/31/10 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:echor_project:echor:0.1.6:*:*:*:*:ruby:*:*

History

21 Nov 2024, 02:05

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2014/01/31/10 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/01/31/10 - Mailing List, Third Party Advisory

Information

Published : 2018-02-02 21:29

Updated : 2024-11-21 02:05


NVD link : CVE-2014-1834

Mitre link : CVE-2014-1834

CVE.ORG link : CVE-2014-1834


JSON object : View

Products Affected

echor_project

  • echor
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')