The extract_from_ocr
function in lib/docsplit/text_extractor.rb
in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.
{ "nvd_published_at": "2013-04-25T23:55:00Z", "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-01-26T23:59:29Z" }