Vulnerability Description
rubygem-openshift-origin-controller: API can be used to create applications via cartridge_cache.rb URI.prase() to perform command injection
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openshift-Origin-Controller Project | Openshift-Origin-Controller | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/cve-2013-2095Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2095ExploitIssue TrackingThird Party Advisory
- https://access.redhat.com/security/cve/cve-2013-2095Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2095ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2013-2095?
CVE-2013-2095 is a vulnerability with a CVSS score of 9.8 (CRITICAL). rubygem-openshift-origin-controller: API can be used to create applications via cartridge_cache.rb URI.prase() to perform command injection
How severe is CVE-2013-2095?
CVE-2013-2095 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2013-2095?
Check the references section above for vendor advisories and patch information. Affected products include: Openshift-Origin-Controller Project Openshift-Origin-Controller.