{"id":"CVE-2013-7050","details":"The get_main_source_dir function in scripts/uscan.pl in devscripts before 2.13.8, when using USCAN_EXCLUSION, allows remote attackers to execute arbitrary commands via shell metacharacters in a directory name.","modified":"2026-04-10T03:43:25.662905Z","published":"2013-12-13T18:07:54Z","references":[{"type":"FIX","url":"http://seclists.org/oss-sec/2013/q4/470"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1040266"},{"type":"WEB","url":"http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git%3Ba=commitdiff%3Bh=91f05b5"},{"type":"WEB","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731849"},{"type":"WEB","url":"http://osvdb.org/100855"},{"type":"WEB","url":"http://seclists.org/oss-sec/2013/q4/486"},{"type":"WEB","url":"http://www.securityfocus.com/bid/64241"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/89666"}],"schema_version":"1.7.5"}