CVE-2012-5646 – openshift-origin-node-util: restorer.php preg_match shell code injection
https://notcve.org/view.php?id=CVE-2012-5646
node-util/www/html/restorer.php in the Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to execute arbitrary commands via a crafted uuid in the PATH_INFO. node-util/www/html/restorer.php en Red Hat OpenShift Origin anterior a v1.0.5-3 permite a atacantes remotos ejecutar comandos arbitrarios mediante un uuid falsificado en el PATH_INFO. • http://rhn.redhat.com/errata/RHSA-2013-0148.html http://www.osvdb.org/89431 http://www.securityfocus.com/bid/57189 https://bugzilla.redhat.com/show_bug.cgi?id=888518 https://github.com/openshift/origin-server/commit/32564a0839b1517d762afab2013c26c0959bac00 https://github.com/openshift/origin-server/pull/1017 https://access.redhat.com/security/cve/CVE-2012-5646 • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •