The perform_request function in /lib/echor/backplane.rb in echor 0.1.6 Ruby Gem allows local users to inject arbitrary code by adding a semi-colon in their username or password.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/01/31/10 | Mailing List Third Party Advisory |
Configurations
Information
Published : 2018-02-02 13:29
Updated : 2018-02-14 07:12
NVD link : CVE-2014-1834
Mitre link : CVE-2014-1834
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
echor_project
- echor