Vulnerability Details : CVE-2014-8990
default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
Products affected by CVE-2014-8990
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:a:lsyncd_project:lsyncd:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-8990
0.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-8990
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-8990
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-8990
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145114.html
[SECURITY] Fedora 20 Update: lsyncd-2.1.4-4.fc20.1Third Party Advisory
-
http://www.debian.org/security/2015/dsa-3130
Debian -- Security Information -- DSA-3130-1 lsyncdThird Party Advisory
-
https://github.com/axkibe/lsyncd/commit/18f02ad013b41a72753912155ae2ba72f2a53e52
Sanitize mv arguments: · axkibe/lsyncd@18f02ad · GitHubExploit;Patch;Issue Tracking
-
https://security.gentoo.org/glsa/201702-05
Lsyncd: Remote execution of arbitrary code (GLSA 201702-05) — Gentoo security
-
http://secunia.com/advisories/62321
Sign in
-
https://github.com/axkibe/lsyncd/issues/220
Backtick in filename make mv fail · Issue #220 · axkibe/lsyncd · GitHubPatch;Issue Tracking
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145131.html
[SECURITY] Fedora 19 Update: lsyncd-2.1.4-4.fc19.1Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/11/19/1
oss-security - CVE request: lsyncd command injectionMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/11/20/5
oss-security - Re: CVE request: lsyncd command injectionExploit;Mailing List;Third Party Advisory
-
https://github.com/axkibe/lsyncd/commit/e6016b3748370878778b8f0b568d5281cc248aa4
Properly sanitize mv parameters (CVE-2014-8990) · axkibe/lsyncd@e6016b3 · GitHubExploit;Patch;Issue Tracking
-
http://www.securityfocus.com/bid/71179
Lsyncd 'default-rsyncssh.lua' Remote Command Injection VulnerabilityThird Party Advisory;VDB Entry
Jump to