Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01ZjJwLTZ2anYtMnEybc4AAe3F

Sup Code Injection vulnerability

Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename of an email attachment.

Permalink: https://github.com/advisories/GHSA-5f2p-6vjv-2q2m
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01ZjJwLTZ2anYtMnEybc4AAe3F
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 8 months ago


Identifiers: GHSA-5f2p-6vjv-2q2m, CVE-2013-4478
References: Repository: https://github.com/sup-heliotrope/sup
Blast Radius: 0.0

Affected Packages

rubygems:sup
Dependent packages: 1
Dependent repositories: 98
Downloads: 446,306 total
Affected Version Ranges: >= 0.14.0, < 0.14.1.1, < 0.13.2.1
Fixed in: 0.14.1.1, 0.13.2.1
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.8.1, 0.9.1, 0.10.1, 0.10.2, 0.12.1, 0.13.0, 0.13.1, 0.13.2, 0.14.0, 0.14.1, 0.15.0, 0.15.1, 0.15.2, 0.15.3, 0.15.4, 0.16.0, 0.17.0, 0.18.0, 0.19.0, 0.20.0, 0.21.0, 0.22.0, 0.22.1
All unaffected versions: