CVE-2013-5036
The Square Squash allows remote attackers to execute arbitrary code via a YAML document in the (1) namespace parameter to the deobfuscation function or (2) sourcemap parameter to the sourcemap function in app/controllers/api/v1_controller.rb.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.8050 (80.5%)
Percentile: 99.1%
EPSS: 2026-05-06
Affects
squash:square_squashTechnical description
The Square Squash allows remote attackers to execute arbitrary code via a YAML document in the (1) namespace parameter to the deobfuscation function or (2) sourcemap parameter to the sourcemap function in app/controllers/api/v1_controller.rb.
Published: 5/27/2014, 2:55:10 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/
- http://osvdb.org/95992
- http://www.exploit-db.com/exploits/27530
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86335
- https://github.com/SquareSquash/web/commit/6d667c19e96e4f23dccbfbe24afeebd18e98e1c5
- http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/
- http://osvdb.org/95992
- http://www.exploit-db.com/exploits/27530