Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpnNG0tcTZ3OC12cmpw
rgpg Code Injection vulnerability
The self.run_gpg
function in lib/rgpg/gpg_helper.rb
in the rgpg gem before 0.2.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpnNG0tcTZ3OC12cmpw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 7 years ago
Updated: about 1 year ago
EPSS Percentage: 0.00739
EPSS Percentile: 0.80671
Identifiers: GHSA-jg4m-q6w8-vrjp, CVE-2013-4203
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-4203
- https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505
- http://www.openwall.com/lists/oss-security/2013/08/03/2
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rgpg/CVE-2013-4203.yml
- https://github.com/advisories/GHSA-jg4m-q6w8-vrjp
Blast Radius: 1.0
Affected Packages
rubygems:rgpg
Dependent packages: 0Dependent repositories: 0
Downloads: 32,685 total
Affected Version Ranges: < 0.2.3
Fixed in: 0.2.3
All affected versions: 0.0.0, 0.1.0, 0.2.0, 0.2.1, 0.2.2
All unaffected versions: 0.2.3, 0.2.4, 0.3.0, 0.4.0