{
  "threat_severity" : "Moderate",
  "public_date" : "2014-10-14T00:00:00Z",
  "bugzilla" : {
    "description" : "luci: privilege escalation through cluster with specially crafted configuration",
    "id" : "989005",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=989005"
  },
  "cvss" : {
    "cvss_base_score" : "5.2",
    "cvss_scoring_vector" : "AV:A/AC:L/Au:S/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-77",
  "details" : [ "Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration.", "It was discovered that luci used eval() on inputs containing strings from the cluster configuration file when generating its web pages. An attacker with privileges to create or edit the cluster configuration could use this flaw to execute arbitrary code as the luci user on a host running luci." ],
  "acknowledgement" : "This issue was discovered by Jan Pokorný (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2014-10-14T00:00:00Z",
    "advisory" : "RHSA-2014:1390",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "luci-0:0.26.0-63.el6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2014-3593\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-3593" ],
  "name" : "CVE-2014-3593",
  "csaw" : false
}