6.8
CVSSv2

CVE-2013-7050

Published: 13/12/2013 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The get_main_source_dir function in scripts/uscan.pl in devscripts prior to 2.13.8, when using USCAN_EXCLUSION, allows remote malicious users to execute arbitrary commands via shell metacharacters in a directory name.

Vulnerable Product Search on Vulmon Subscribe to Product

devscripts devel team devscripts 2.13.5

devscripts devel team devscripts 2.13.2

devscripts devel team devscripts

devscripts devel team devscripts 2.13.4

devscripts devel team devscripts 2.13.1

devscripts devel team devscripts 2.13.0

devscripts devel team devscripts 2.13.6

devscripts devel team devscripts 2.13.3

Vendor Advisories

Debian Bug report logs - #731849 uscan: arbitrary code execution (CVE-2013-7050) Package: devscripts; Maintainer for devscripts is Devscripts Maintainers <devscripts@packagesdebianorg>; Source for devscripts is src:devscripts (PTS, buildd, popcon) Reported by: Jakub Wilk <jwilk@debianorg> Date: Tue, 10 Dec 2013 13 ...