Vulnerability Description
node-util/www/html/restorer.php in the Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to execute arbitrary commands via a crafted uuid in the PATH_INFO.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Openshift | 1.0 |
| Redhat | Openshift Origin | <= 1.0.5 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2013-0148.htmlVendor Advisory
- http://www.osvdb.org/89431
- http://www.securityfocus.com/bid/57189
- https://bugzilla.redhat.com/show_bug.cgi?id=888518
- https://github.com/openshift/origin-server/commit/32564a0839b1517d762afab2013c26
- https://github.com/openshift/origin-server/pull/1017
- http://rhn.redhat.com/errata/RHSA-2013-0148.htmlVendor Advisory
- http://www.osvdb.org/89431
- http://www.securityfocus.com/bid/57189
- https://bugzilla.redhat.com/show_bug.cgi?id=888518
- https://github.com/openshift/origin-server/commit/32564a0839b1517d762afab2013c26
- https://github.com/openshift/origin-server/pull/1017
FAQ
What is CVE-2012-5646?
CVE-2012-5646 is a vulnerability with a CVSS score of 7.5 (HIGH). node-util/www/html/restorer.php in the Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to execute arbitrary commands via a crafted uuid in the PATH_INFO.
How severe is CVE-2012-5646?
CVE-2012-5646 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-5646?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openshift, Redhat Openshift Origin.