GHSA-4jm3-pfpf-h54p

Suggest an improvement
Source
https://github.com/advisories/GHSA-4jm3-pfpf-h54p
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-4jm3-pfpf-h54p/GHSA-4jm3-pfpf-h54p.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4jm3-pfpf-h54p
Aliases
Published
2017-10-24T18:33:35Z
Modified
2024-02-16T08:24:31.339878Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
espeak-ruby allows arbitrary command execution
Details

The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-284"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T20:58:29Z"
}
References

Affected packages

RubyGems / espeak-ruby

Package

Name
espeak-ruby
Purl
pkg:gem/espeak-ruby

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.3

Affected versions

0.*

0.3.0
0.4.0

1.*

1.0.0
1.0.1
1.0.2