Command Injection Vulnerability
Rasheed Abdul-Aziz
The Cloud Foundry Foundation and Pivotal Inc discovered an exploit for
remote command injection. It's long been fixed, however we realized that many community projects still contain the exploit. If you are responsible for any of the following repositories, please consider patching them soon. The patch is described in the detailed report <https://docs.google.com/document/d/1MOJPOR_fNjvhu2zcEvLm632Dmd2HGp71UCrSmyOHcFs/pub> This exploit <http://pivotal.io/security/cve-2016-6655>exists in the following projects. We've highlighted the affected lines *docker-registry-boshrelease* https://github.com/cloudfoundry-community/docker-registry-boshrelease/blob/ master/src/common/utils.sh#L4-L5 *stackdriver-tools* https://github.com/cloudfoundry-community/stackdriver-tools/blob/master/ src/common/utils.sh#L3-L4 *hazelcast* https://github.com/cloudfoundry-community/hazelcast/blob/master/ hazelcast-enterprise-for-pcf/release/src/common/utils.sh#L4-L5 https://github.com/cloudfoundry-community/hazelcast/blob/master/ hazelcast-for-pcf/release/src/common/utils.sh#L4-L5 https://github.com/cloudfoundry-community/hazelcast/blob/master/ hazelcast-mancenter-for-pcf/release/src/common/utils.sh#L4-L5 *gogs-boshrelease* https://github.com/cloudfoundry-community/gogs-boshrelease/blob/master/src/ common/utils.sh#L4-L5 *bosh-softlayer-pool-server-release* https://github.com/cloudfoundry-community/bosh- softlayer-pool-server-release/blob/master/jobs/vps/ templates/pid_utils.sh.erb#L3-L4 Kind Regards, Rasheed Abdul-Aziz And Zamir Johl Pivotal Inc Security Triage Team. |
|