Vulnerability Description
Red Hat OpenShift Enterprise 2.0 and 2.1 and OpenShift Origin allow remote authenticated users to execute arbitrary commands via shell metacharacters in a directory name that is referenced by a cartridge using the file: URI scheme.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Openshift | 2.0 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2014-0529.htmlVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2014-0530.htmlVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1096955Exploit
- http://rhn.redhat.com/errata/RHSA-2014-0529.htmlVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2014-0530.htmlVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1096955Exploit
FAQ
What is CVE-2014-0233?
CVE-2014-0233 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Red Hat OpenShift Enterprise 2.0 and 2.1 and OpenShift Origin allow remote authenticated users to execute arbitrary commands via shell metacharacters in a directory name that is referenced by a cartri...
How severe is CVE-2014-0233?
CVE-2014-0233 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0233?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openshift.