Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-54314

Опубликовано: 20 июл. 2025
Источник: debian
EPSS Низкий

Описание

Thor before 1.4.0 can construct an unsafe shell command from library input. NOTE: this is disputed by the Supplier because "the method that was fixed can only be used with arguments that are controlled by Thor, and there is no way an attacker can take control of those arguments."

Примечания

  • Disputed security issue for src:ruby-thor (was also bug #1109679)

  • https://github.com/rails/thor/pull/897#issuecomment-3169147633

  • https://hackerone.com/reports/3260153

  • https://github.com/rails/thor/pull/897

  • Fixed by: https://github.com/rails/thor/commit/f7418232b167cbb5c8071b7d0491aef82948feff (v1.4.0)

EPSS

Процентиль: 4%
0.00021
Низкий

Связанные уязвимости

CVSS3: 2.8
ubuntu
около 1 месяца назад

Thor before 1.4.0 can construct an unsafe shell command from library input. NOTE: this is disputed by the Supplier because "the method that was fixed can only be used with arguments that are controlled by Thor, and there is no way an attacker can take control of those arguments."

CVSS3: 2.8
redhat
около 1 месяца назад

Thor before 1.4.0 can construct an unsafe shell command from library input. NOTE: this is disputed by the Supplier because "the method that was fixed can only be used with arguments that are controlled by Thor, and there is no way an attacker can take control of those arguments."

CVSS3: 2.8
nvd
около 1 месяца назад

Thor before 1.4.0 can construct an unsafe shell command from library input. NOTE: this is disputed by the Supplier because "the method that was fixed can only be used with arguments that are controlled by Thor, and there is no way an attacker can take control of those arguments."

CVSS3: 7.8
github
около 1 месяца назад

Withdrawn Advisory: Thor can construct an unsafe shell command from library input.

EPSS

Процентиль: 4%
0.00021
Низкий