Логотип exploitDog
bind:CVE-2017-17405
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-17405

Количество 8

Количество 8

ubuntu логотип

CVE-2017-17405

почти 8 лет назад

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 8.8
EPSS: Высокий
redhat логотип

CVE-2017-17405

почти 8 лет назад

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 6.3
EPSS: Высокий
nvd логотип

CVE-2017-17405

почти 8 лет назад

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 8.8
EPSS: Высокий
debian логотип

CVE-2017-17405

почти 8 лет назад

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, get ...

CVSS3: 8.8
EPSS: Высокий
github логотип

GHSA-q23r-c9rf-97q3

больше 3 лет назад

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 8.8
EPSS: Высокий
fstec логотип

BDU:2019-00512

почти 8 лет назад

Уязвимость реализации команд Net::FTP интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
EPSS: Высокий
oracle-oval логотип

ELSA-2018-0378

больше 7 лет назад

ELSA-2018-0378: ruby security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1570-1

больше 5 лет назад

Security update for ruby2.1

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-17405

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 8.8
89%
Высокий
почти 8 лет назад
redhat логотип
CVE-2017-17405

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 6.3
89%
Высокий
почти 8 лет назад
nvd логотип
CVE-2017-17405

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 8.8
89%
Высокий
почти 8 лет назад
debian логотип
CVE-2017-17405

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, get ...

CVSS3: 8.8
89%
Высокий
почти 8 лет назад
github логотип
GHSA-q23r-c9rf-97q3

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 8.8
89%
Высокий
больше 3 лет назад
fstec логотип
BDU:2019-00512

Уязвимость реализации команд Net::FTP интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
89%
Высокий
почти 8 лет назад
oracle-oval логотип
ELSA-2018-0378

ELSA-2018-0378: ruby security update (IMPORTANT)

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2020:1570-1

Security update for ruby2.1

больше 5 лет назад

Уязвимостей на страницу