git_http_controller.rb in the redmine_git_hosting plugin for Redmine allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the service parameter to info/refs, related to the get_info_refs function or (2) the reqfile argument to the file_exists function.
References
Link | Resource |
---|---|
http://www.sec-1.com/blog/2013/redmine-git-hosting-plugin-remote-command-execution | Exploit |
Configurations
History
No history.
Information
Published : 2014-12-28 00:59
Updated : 2014-12-29 16:32
NVD link : CVE-2013-4663
Mitre link : CVE-2013-4663
CVE.ORG link : CVE-2013-4663
JSON object : View
Products Affected
redmine
- redmine_git_hosting_plugin
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')