Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXA2NzMtaGpmMi1wd2Zy
Shell command injection in command_wrap
command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename.
Permalink: https://github.com/advisories/GHSA-p673-hjf2-pwfrJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXA2NzMtaGpmMi1wd2Zy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 7 years ago
Updated: about 1 year ago
EPSS Percentage: 0.00838
EPSS Percentile: 0.81853
Identifiers: GHSA-p673-hjf2-pwfr, CVE-2013-1875
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-1875
- https://github.com/advisories/GHSA-p673-hjf2-pwfr
- http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html
- http://seclists.org/fulldisclosure/2013/Mar/175
- http://www.openwall.com/lists/oss-security/2013/03/19/9
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/command_wrap/CVE-2013-1875.yml
Affected Packages
rubygems:command_wrap
Dependent packages: 0Dependent repositories: 1
Downloads: 40,483 total
Affected Version Ranges: <= 0.6.2
No known fixed version
All affected versions: 0.5.1, 0.5.2, 0.6.1, 0.6.2