Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXcyNDgteHIzNy1qeDht
fastreader Gem for Ruby URI Handling Arbitrary Command Injection
fastreader Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.
Permalink: https://github.com/advisories/GHSA-w248-xr37-jx8mJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXcyNDgteHIzNy1qeDht
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 7 years ago
Updated: about 1 year ago
Identifiers: GHSA-w248-xr37-jx8m, CVE-2013-2615
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-2615
- http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html
- http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html
- http://seclists.org/fulldisclosure/2013/Mar/122
- http://www.openwall.com/lists/oss-security/2013/03/19/9
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fastreader/CVE-2013-2615.yml
- https://github.com/advisories/GHSA-w248-xr37-jx8m
Affected Packages
rubygems:fastreader
Dependent packages: 0Dependent repositories: 13
Downloads: 38,048 total
Affected Version Ranges: >= 1.0.0
No known fixed version
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8