Описание
sprout Arbitrary Code Execution vulnerability
The unpack_zip
function in archive_unpacker.rb
in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2013-6421
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sprout/CVE-2013-6421.yml
- http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html
- http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html
- http://www.openwall.com/lists/oss-security/2013/12/03/1
- http://www.openwall.com/lists/oss-security/2013/12/03/6
Пакеты
Наименование
sprout
rubygems
Затронутые версииВерсия исправления
= 0.7.246
Отсутствует
Связанные уязвимости
nvd
больше 11 лет назад
The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.