eventapp/lib/gcloud.rb in the ISUCON5 qualifier portal (aka eventapp) web application before 2015-10-30 makes improper popen calls, which allows remote attackers to execute arbitrary commands via an HTTP request that includes shell metacharacters in an argument to a "gcloud compute" command.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000175 | third party advisory vendor advisory |
https://github.com/isucon/isucon5-qualify/commit/150e3e6d851acb31a0b15ce93380a7dab14203fa | |
https://github.com/isucon/isucon5-qualify/pull/5 | |
http://jvn.jp/en/jp/JVN04281281/index.html | third party advisory vendor advisory |