Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qfwq-chf4-jvwg

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

karo Metacharacter Handling Remote Command Execution

The karo gem through 2.5.2 for Ruby allows Remote command injection via the host field.

A flaw in db.rb is triggered when handling metacharacters. This may allow a remote attacker to execute arbitrary commands.

In particular lines 76 and 95 (as of 2014-06-01) pass unsanitized user supplied input to the command line.

73- host = "{@configuration["user"]}@{@configuration["host"]}" 74- cmd = "ssh #{host} cat {server_db_config_file}" 75- 76: server_db_config_output = `{cmd}` 79- -- 89- def drop_and_create_local_database(local_db_config) 90- command = case local_db_config["adapter"] 91- when "mysql2" 93- when "postgresql" 95- dropdb -h #{local_db_config["host"]} -U #{local_db_config["username"]} --if-exists #{local_db_config["database"]}

If this gem is used in the context of a rails application malicious input could lead to remote command injection. As of version 2.5.2 the affected code lines have not changed.

Пакеты

Наименование

karo

rubygems
Затронутые версииВерсия исправления

<= 2.5.2

Отсутствует

EPSS

Процентиль: 87%
0.03343
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 9.8
nvd
больше 7 лет назад

The karo gem 2.3.8 for Ruby allows Remote command injection via the host field.

EPSS

Процентиль: 87%
0.03343
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-77