Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWh4eDYtcDI0di13Zzhj
Curl Gem insufficient URL escaping command injection
lib/curl.rb
in the Curl Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWh4eDYtcDI0di13Zzhj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 7 years ago
Updated: over 1 year ago
EPSS Percentage: 0.00815
EPSS Percentile: 0.8161
Identifiers: GHSA-hxx6-p24v-wg8c, CVE-2013-2617
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-2617
- http://packetstormsecurity.com/files/120778/Ruby-Gem-Curl-Command-Execution.html
- http://seclists.org/fulldisclosure/2013/Mar/124
- http://www.openwall.com/lists/oss-security/2013/03/19/9
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/curl/CVE-2013-2617.yml
- https://github.com/advisories/GHSA-hxx6-p24v-wg8c
Affected Packages
rubygems:curl
Dependent packages: 3Dependent repositories: 48
Downloads: 340,440 total
Affected Version Ranges: <= 0.0.9
No known fixed version
All affected versions: 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.0.9