CVE-2014-0156
Summary
| CVE | CVE-2014-0156 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-06-30 21:15:00 UTC |
| Updated | 2022-07-12 15:31:00 UTC |
| Description | Awesome spawn contains OS command injection vulnerability, which allows execution of additional commands passed to Awesome spawn as arguments. If untrusted input was included in command arguments, attacker could use this flaw to execute arbitrary command. |
Risk And Classification
Problem Types: CWE-78
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Manageiq | Awesomespawn | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Separate command line building and sanitizing into its own class. · ManageIQ/awesome_spawn@e524f85 · GitHub | MISC | github.com | |
| CVE-2014-0156 (awesome_spawn): OS command injection flaw in awesome_spawn - RubySec | MISC | rubysec.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.