// For flags

CVE-2013-7050

 

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The get_main_source_dir function in scripts/uscan.pl in devscripts before 2.13.8, when using USCAN_EXCLUSION, allows remote attackers to execute arbitrary commands via shell metacharacters in a directory name.

La funciĆ³n get_main_source_dir en scripts/uscan.pl en devscripts anterior a 2.13.8, al utilizar USCAN_EXCLUSION, permite a atacantes remotos ejecutar comandos arbitrarios mediante metacaracteres de shell en un nombre de directorio.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-12-11 CVE Reserved
  • 2013-12-13 CVE Published
  • 2023-10-26 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Devscripts Devel Team
Search vendor "Devscripts Devel Team"
Devscripts
Search vendor "Devscripts Devel Team" for product "Devscripts"
<= 2.13.7
Search vendor "Devscripts Devel Team" for product "Devscripts" and version " <= 2.13.7"
-
Affected
Devscripts Devel Team
Search vendor "Devscripts Devel Team"
Devscripts
Search vendor "Devscripts Devel Team" for product "Devscripts"
2.13.0
Search vendor "Devscripts Devel Team" for product "Devscripts" and version "2.13.0"
-
Affected
Devscripts Devel Team
Search vendor "Devscripts Devel Team"
Devscripts
Search vendor "Devscripts Devel Team" for product "Devscripts"
2.13.1
Search vendor "Devscripts Devel Team" for product "Devscripts" and version "2.13.1"
-
Affected
Devscripts Devel Team
Search vendor "Devscripts Devel Team"
Devscripts
Search vendor "Devscripts Devel Team" for product "Devscripts"
2.13.2
Search vendor "Devscripts Devel Team" for product "Devscripts" and version "2.13.2"
-
Affected
Devscripts Devel Team
Search vendor "Devscripts Devel Team"
Devscripts
Search vendor "Devscripts Devel Team" for product "Devscripts"
2.13.3
Search vendor "Devscripts Devel Team" for product "Devscripts" and version "2.13.3"
-
Affected
Devscripts Devel Team
Search vendor "Devscripts Devel Team"
Devscripts
Search vendor "Devscripts Devel Team" for product "Devscripts"
2.13.4
Search vendor "Devscripts Devel Team" for product "Devscripts" and version "2.13.4"
-
Affected
Devscripts Devel Team
Search vendor "Devscripts Devel Team"
Devscripts
Search vendor "Devscripts Devel Team" for product "Devscripts"
2.13.5
Search vendor "Devscripts Devel Team" for product "Devscripts" and version "2.13.5"
-
Affected
Devscripts Devel Team
Search vendor "Devscripts Devel Team"
Devscripts
Search vendor "Devscripts Devel Team" for product "Devscripts"
2.13.6
Search vendor "Devscripts Devel Team" for product "Devscripts" and version "2.13.6"
-
Affected