Vulnerability Description
eventapp/lib/gcloud.rb in the ISUCON5 qualifier portal (aka eventapp) web application before 2015-10-30 makes improper popen calls, which allows remote attackers to execute arbitrary commands via an HTTP request that includes shell metacharacters in an argument to a "gcloud compute" command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Isucon | Isucon 5 Qualifier Eventapp | - |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN04281281/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2015-000175Vendor Advisory
- https://github.com/isucon/isucon5-qualify/commit/150e3e6d851acb31a0b15ce93380a7d
- https://github.com/isucon/isucon5-qualify/pull/5
- http://jvn.jp/en/jp/JVN04281281/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2015-000175Vendor Advisory
- https://github.com/isucon/isucon5-qualify/commit/150e3e6d851acb31a0b15ce93380a7d
- https://github.com/isucon/isucon5-qualify/pull/5
FAQ
What is CVE-2015-5673?
CVE-2015-5673 is a vulnerability with a CVSS score of 6.5 (MEDIUM). eventapp/lib/gcloud.rb in the ISUCON5 qualifier portal (aka eventapp) web application before 2015-10-30 makes improper popen calls, which allows remote attackers to execute arbitrary commands via an H...
How severe is CVE-2015-5673?
CVE-2015-5673 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5673?
Check the references section above for vendor advisories and patch information. Affected products include: Isucon Isucon 5 Qualifier Eventapp.