Files
CVEs-PoC/2014/CVE-2014-0156.md
T
2024-06-18 02:51:15 +02:00

18 lines
774 B
Markdown

### [CVE-2014-0156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0156)
![](https://img.shields.io/static/v1?label=Product&message=awesome_spawn&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78&color=brighgreen)
### Description
Awesome spawn contains OS command injection vulnerability, which allows execution of additional commands passed to Awesome spawn as arguments. If untrusted input was included in command arguments, attacker could use this flaw to execute arbitrary command.
### POC
#### Reference
- https://github.com/ManageIQ/awesome_spawn/commit/e524f85f1c6e292ef7d117d7818521307ac269ff
#### Github
No PoCs found on GitHub currently.