Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpwcHYtZ3czci13M3E4

OS Command Injection in Rake

There is an OS command injection vulnerability in Ruby Rake before 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character |.

Permalink: https://github.com/advisories/GHSA-jppv-gw3r-w3q8
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpwcHYtZ3czci13M3E4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 4 years ago
Updated: 8 months ago


CVSS Score: 6.4
CVSS vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-jppv-gw3r-w3q8, CVE-2020-8130
References: Repository: https://github.com/ruby/rake
Blast Radius: 39.0

Affected Packages

rubygems:rake
Dependent packages: 80,438
Dependent repositories: 1,222,401
Downloads: 856,012,407 total
Affected Version Ranges: <= 12.3.2
Fixed in: 12.3.3
All affected versions: 0.4.8, 0.4.9, 0.4.10, 0.4.11, 0.4.12, 0.4.13, 0.4.14, 0.4.15, 0.5.0, 0.5.3, 0.5.4, 0.6.0, 0.6.2, 0.7.0, 0.7.1, 0.7.2, 0.7.3, 0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.8.5, 0.8.6, 0.8.7, 0.9.0, 0.9.1, 0.9.2, 0.9.3, 0.9.4, 0.9.5, 0.9.6, 10.0.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4, 10.1.0, 10.1.1, 10.2.0, 10.2.1, 10.2.2, 10.3.0, 10.3.1, 10.3.2, 10.4.0, 10.4.1, 10.4.2, 10.5.0, 11.0.1, 11.1.0, 11.1.1, 11.1.2, 11.2.0, 11.2.2, 11.3.0, 12.0.0, 12.1.0, 12.2.0, 12.2.1, 12.3.0, 12.3.1, 12.3.2
All unaffected versions: 12.3.3, 13.0.0, 13.0.1, 13.0.2, 13.0.3, 13.0.4, 13.0.5, 13.0.6, 13.1.0, 13.2.0, 13.2.1