CVE-2014-3593
CVSS V2 Medium 6
CVSS V3 None
Description
Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration.
Overview
- CVE ID
- CVE-2014-3593
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Modified
- Published Version
- 2014-10-15T14:55:06
- Last Modified Date
- 2023-02-13T00:40:52
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:scientificlinux:luci:0.26.0:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:S/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- SINGLE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6
- Severity
- MEDIUM
- Exploitability Score
- 6.8
- Impact Score
- 6.4
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2014-3593 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3593 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 10:29:46 | Added to TrackCVE | |||
2022-12-02 01:26:49 | 2014-10-15T14:55Z | 2014-10-15T14:55:06 | CVE Published Date | updated |
2022-12-02 01:26:49 | 2014-10-22T01:15:42 | CVE Modified Date | updated | |
2022-12-02 01:26:49 | Analyzed | Vulnerability Status | updated | |
2023-02-02 17:04:38 | 2023-02-02T16:15:50 | CVE Modified Date | updated | |
2023-02-02 17:04:38 | Analyzed | Modified | Vulnerability Status | updated |
2023-02-02 17:04:39 | Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration. | It was discovered that luci used eval() on inputs containing strings from the cluster configuration file when generating its web pages. An attacker with privileges to create or edit the cluster configuration could use this flaw to execute arbitrary code as the luci user on a host running luci. | Description | updated |
2023-02-02 17:04:40 | References | updated | ||
2023-02-13 01:05:13 | 2023-02-13T00:40:52 | CVE Modified Date | updated | |
2023-02-13 01:05:14 | It was discovered that luci used eval() on inputs containing strings from the cluster configuration file when generating its web pages. An attacker with privileges to create or edit the cluster configuration could use this flaw to execute arbitrary code as the luci user on a host running luci. | Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration. | Description | updated |