{ "id": "CVE-2013-4457", "sourceIdentifier": "secalert@redhat.com", "published": "2013-11-02T18:55:03.203", "lastModified": "2024-11-21T01:55:36.330", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cocaine gem 0.4.0 through 0.5.2 for Ruby allows context-dependent attackers to execute arbitrary commands via a crafted has object, related to recursive variable interpolation." }, { "lang": "es", "value": "The Cocaine gem 0.5.2 hasta la versi\u00f3n 0.4.0 para Ruby permite a atacantes dependientes del contexto ejecutar comandos arbitrarios a trav\u00e9s de un objetomanipulado, en relaci\u00f3n con una interpolaci\u00f3n variable recursiva." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-78" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:thoughtbot:cocaine:0.4.0:-:*:*:*:ruby:*:*", "matchCriteriaId": "E0A3F112-7C8C-452B-B575-086CC85C66A8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:thoughtbot:cocaine:0.4.1:-:*:*:*:ruby:*:*", "matchCriteriaId": "C3B7D3FF-A2DF-4D5F-AEDE-652CAF37DEE6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:thoughtbot:cocaine:0.4.2:-:*:*:*:ruby:*:*", "matchCriteriaId": "C672466B-D327-48B5-8104-2988733A7EC3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:thoughtbot:cocaine:0.5.0:*:*:*:*:ruby:*:*", "matchCriteriaId": "043EF947-A38D-4622-86EE-D1A77729578C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:thoughtbot:cocaine:0.5.1:-:*:*:*:ruby:*:*", "matchCriteriaId": "79A123CF-DBCB-49C2-B581-6B50E3F211F5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:thoughtbot:cocaine:0.5.2:-:*:*:*:ruby:*:*", "matchCriteriaId": "67BABC98-3058-4741-8B12-3F8A5830E240" } ] } ] } ], "references": [ { "url": "http://osvdb.org/98835", "source": "secalert@redhat.com" }, { "url": "http://secunia.com/advisories/55365", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/10/22/10", "source": "secalert@redhat.com" }, { "url": "https://github.com/thoughtbot/cocaine/blob/master/NEWS.md", "source": "secalert@redhat.com" }, { "url": "http://osvdb.org/98835", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/55365", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/10/22/10", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://github.com/thoughtbot/cocaine/blob/master/NEWS.md", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }