CVE-2013-5036
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
27/05/2014
Last modified:
12/04/2025
Description
The Square Squash allows remote attackers to execute arbitrary code via a YAML document in the (1) namespace parameter to the deobfuscation function or (2) sourcemap parameter to the sourcemap function in app/controllers/api/v1_controller.rb.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:squash:square_squash:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/
- http://osvdb.org/95992
- http://www.exploit-db.com/exploits/27530
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86335
- https://github.com/SquareSquash/web/commit/6d667c19e96e4f23dccbfbe24afeebd18e98e1c5
- http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/
- http://osvdb.org/95992
- http://www.exploit-db.com/exploits/27530
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86335
- https://github.com/SquareSquash/web/commit/6d667c19e96e4f23dccbfbe24afeebd18e98e1c5



