CVE-2014-3593

Impact:
Moderate
Public Date:
2014-10-14
CWE:
CWE-77
Bugzilla:
989005: CVE-2014-3593 luci: privilege escalation through cluster with specially crafted configuration
It was discovered that luci used eval() on inputs containing strings from the cluster configuration file when generating its web pages. An attacker with privileges to create or edit the cluster configuration could use this flaw to execute arbitrary code as the luci user on a host running luci.

Find out more about CVE-2014-3593 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5.2
Base Metrics AV:A/AC:L/Au:S/C:P/I:P/A:P
Access Vector Adjacent Network
Access Complexity Low
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (luci) RHSA-2014:1390 2014-10-14

Acknowledgements

This issue was discovered by Jan Pokorný of Red Hat.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.