// For flags

CVE-2014-3496

Origin: Command execution as root via downloadable cartridge source-url

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

cartridge_repository.rb in OpenShift Origin and Enterprise 1.2.8 through 2.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a Source-Url ending with a (1) .tar.gz, (2) .zip, (3) .tgz, or (4) .tar file extension in a cartridge manifest file.

cartridge_repository.rb en OpenShift Origin and Enterprise 1.2.8 hasta 2.1.1 permite a atacantes remotos ejecutar comandos arbitrarios a través de metacaracteres de shell en una Url de fuente que termina con una extensión de fichero (1) .tar.gz, (2) .zip, (3) .tgz o (4) .tar en un fichero del manifiesto de cartuchos.

The rubygem-openshift-origin-node package provides basic OpenShift node functionality. A command injection flaw was found in rubygem-openshift-origin-node. A remote, authenticated user permitted to install cartridges via the web interface could use this flaw to execute arbitrary code with root privileges on the Red Hat OpenShift Enterprise node server. This issue was discovered by Jeremy Choi of the Red Hat HSS Pen-test Team. The rubygem-openshift-origin-node package has been upgraded to version 1.23.9.11. Additionally, the rubygem-openshift-origin-container-selinux package has been upgraded to version 0.8.1.2, as needed by the updated rubygem-openshift-origin-node package.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-05-14 CVE Reserved
  • 2014-06-18 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
1.2.8
Search vendor "Redhat" for product "Openshift" and version "1.2.8"
enterprise
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
2.0
Search vendor "Redhat" for product "Openshift" and version "2.0"
-
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
2.0.1
Search vendor "Redhat" for product "Openshift" and version "2.0.1"
enterprise
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
2.0.2
Search vendor "Redhat" for product "Openshift" and version "2.0.2"
enterprise
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
2.0.3
Search vendor "Redhat" for product "Openshift" and version "2.0.3"
enterprise
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
2.0.4
Search vendor "Redhat" for product "Openshift" and version "2.0.4"
enterprise
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
2.0.5
Search vendor "Redhat" for product "Openshift" and version "2.0.5"
enterprise
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
2.0.6
Search vendor "Redhat" for product "Openshift" and version "2.0.6"
enterprise
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
2.1
Search vendor "Redhat" for product "Openshift" and version "2.1"
enterprise
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
2.1.1
Search vendor "Redhat" for product "Openshift" and version "2.1.1"
enterprise
Affected
Redhat
Search vendor "Redhat"
Openshift Origin
Search vendor "Redhat" for product "Openshift Origin"
1.2.8
Search vendor "Redhat" for product "Openshift Origin" and version "1.2.8"
-
Affected
Redhat
Search vendor "Redhat"
Openshift Origin
Search vendor "Redhat" for product "Openshift Origin"
2.1
Search vendor "Redhat" for product "Openshift Origin" and version "2.1"
-
Affected
Redhat
Search vendor "Redhat"
Openshift Origin
Search vendor "Redhat" for product "Openshift Origin"
2.1.1
Search vendor "Redhat" for product "Openshift Origin" and version "2.1.1"
-
Affected