GHSA-p65m-qr5x-rrqq

Suggest an improvement
Source
https://github.com/advisories/GHSA-p65m-qr5x-rrqq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-p65m-qr5x-rrqq/GHSA-p65m-qr5x-rrqq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-p65m-qr5x-rrqq
Aliases
  • CVE-2013-7086
Published
2017-10-24T18:33:36Z
Modified
2024-12-05T05:33:16.538773Z
Summary
Webbynode Code Injection vulnerability
Details

The message function in lib/webbynode/notify.rb in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-06-16T21:48:09Z",
    "github_reviewed": true,
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-94"
    ]
}
References

Affected packages

RubyGems / webbynode

Package

Name
webbynode
Purl
pkg:gem/webbynode

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.0.5.3

Affected versions

0.*

0.1.0
0.1.1
0.1.2
0.2.0
0.2.1
0.2.2
0.2.3
0.2.4
0.2.4.1
0.2.5.beta1
0.2.5.beta2

1.*

1.0.0
1.0.1
1.0.2
1.0.3.beta
1.0.3.beta1
1.0.3.beta4
1.0.3
1.0.4.beta3
1.0.4.beta4
1.0.4
1.0.4.2
1.0.4.3
1.0.5.beta2
1.0.5.beta3
1.0.5.beta4
1.0.5.beta5
1.0.5.beta6
1.0.5.beta7
1.0.5.beta10
1.0.5
1.0.5.1
1.0.5.2
1.0.5.3