Vulnerability Name:

CVE-2013-7050 (CCN-89666)

Assigned:2013-12-11
Published:2013-12-11
Updated:2017-08-29
Summary:The get_main_source_dir function in scripts/uscan.pl in devscripts before 2.13.8, when using USCAN_EXCLUSION, allows remote attackers to execute arbitrary commands via shell metacharacters in a directory name.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-94
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: Patch
http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git;a=commitdiff;h=91f05b5

Source: CONFIRM
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849

Source: MITRE
Type: CNA
CVE-2013-7050

Source: OSVDB
Type: UNKNOWN
100855

Source: MLIST
Type: Patch
[oss-securit] 20131211 CVE request: devscripts (uscan) command execution flaw

Source: CCN
Type: oss-sec Mailing List, Wed, 11 Dec 2013 23:56:36 -0500 (EST)
Re: CVE request: devscripts (uscan) command execution flaw

Source: MLIST
Type: UNKNOWN
[oss-securit] 20131211 Re: CVE request: devscripts (uscan) command execution flaw

Source: CCN
Type: Debian Web Site
Debian -- The Universal Operating System

Source: BID
Type: UNKNOWN
64241

Source: CCN
Type: BID-64241
Debian devscripts 'uscan' CVE-2013-7050 Remote Command Execution Vulnerability

Source: CCN
Type: Red Hat Bugzilla Bug 1040266
(CVE-2013-7050) CVE-2013-7050 devscripts: code execution flaw in uscan

Source: CONFIRM
Type: Patch
https://bugzilla.redhat.com/show_bug.cgi?id=1040266

Source: XF
Type: UNKNOWN
devscripts-cve20137050-command-execution(89666)

Source: XF
Type: UNKNOWN
devscripts-cve20137050-command-execution(89666)

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2013-7050

Vulnerable Configuration:Configuration 1:
  • cpe:/a:devscripts_devel_team:devscripts:2.13.0:*:*:*:*:*:*:*
  • OR cpe:/a:devscripts_devel_team:devscripts:2.13.1:*:*:*:*:*:*:*
  • OR cpe:/a:devscripts_devel_team:devscripts:2.13.2:*:*:*:*:*:*:*
  • OR cpe:/a:devscripts_devel_team:devscripts:2.13.3:*:*:*:*:*:*:*
  • OR cpe:/a:devscripts_devel_team:devscripts:2.13.4:*:*:*:*:*:*:*
  • OR cpe:/a:devscripts_devel_team:devscripts:2.13.5:*:*:*:*:*:*:*
  • OR cpe:/a:devscripts_devel_team:devscripts:2.13.6:*:*:*:*:*:*:*
  • OR cpe:/a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:* (Version <= 2.13.7)

  • Configuration CCN 1:
  • cpe:/a:debian:devscripts:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20137050000
    V
    CVE-2013-7050 on Ubuntu 12.04 LTS (precise) - medium.
    2013-12-13
    BACK
    devscripts_devel_team devscripts 2.13.0
    devscripts_devel_team devscripts 2.13.1
    devscripts_devel_team devscripts 2.13.2
    devscripts_devel_team devscripts 2.13.3
    devscripts_devel_team devscripts 2.13.4
    devscripts_devel_team devscripts 2.13.5
    devscripts_devel_team devscripts 2.13.6
    devscripts_devel_team devscripts *
    debian devscripts *