GHSA-w248-xr37-jx8m

Suggest an improvement
Source
https://github.com/advisories/GHSA-w248-xr37-jx8m
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-w248-xr37-jx8m/GHSA-w248-xr37-jx8m.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-w248-xr37-jx8m
Aliases
  • CVE-2013-2615
Published
2017-10-24T18:33:37Z
Modified
2024-12-03T06:14:23.814364Z
Summary
fastreader Gem for Ruby URI Handling Arbitrary Command Injection
Details

fastreader Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-94"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:59:12Z"
}
References

Affected packages

RubyGems / fastreader

Package

Name
fastreader
Purl
pkg:gem/fastreader

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.0.0

Affected versions

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8