Описание
Code injection in pdf_info
pdf_info 0.5.3 is vulnerable to Command Execution. An attacker using a specially crafted payload may execute OS commands by using command chaining because during object initalization there is no validation performed and the user provided path is used.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-36231
- https://github.com/newspaperclub/pdf_info/issues/16
- https://github.com/newspaperclub/pdf_info/pull/15
- https://github.com/affix/CVE-2022-36231
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pdf_info/CVE-2022-36231.yml
- https://rubygems.org/gems/pdf_info
Пакеты
Наименование
pdf_info
rubygems
Затронутые версииВерсия исправления
<= 0.5.3
Отсутствует
Связанные уязвимости
CVSS3: 9.8
nvd
почти 3 года назад
pdf_info 0.5.3 is vulnerable to Command Execution because the Ruby code uses backticks instead of Open3.