Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-CCD5C0DAEA736496505686C766B3B898
HistoryMay 02, 2014 - 12:00 a.m.

Remote Command Injection

2014-05-0200:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.023 Low

EPSS

Percentile

89.5%

Unsanitized input is passed to the shell. A malicious user can inject shell commands by sending shell meta characters like ‘;’ in some variables.

CPENameOperatorVersion
gem/arabic-prawngt0.0.0

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.023 Low

EPSS

Percentile

89.5%

Related for GITLAB-CCD5C0DAEA736496505686C766B3B898