Sha256: 5e4c693483e1016dca6a416223db88653f8c73782849860989b38c7532406e26

Contents?: true

Size: 650 Bytes

Versions: 1

Compression:

Stored size: 650 Bytes

Contents

---
gem: rexical
cve: 2019-5477
date: 2019-08-11
url: https://github.com/tenderlove/rexical/commit/a652474dbc66be350055db3e8f9b3a7b3fd75926
title: Rexical Command Injection Vulnerability
description: |
  A command injection vulnerability appears in code generated by the Rexical
  gem versions v1.0.6 and earlier. It allows commands to be executed in a
  subprocess by Ruby's `Kernel.open` method.

patched_versions:
  - ">= 1.0.7"

cvss_v2: 7.5
cvss_v3: 9.8

related:
  url:
    - https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc#107--2019-08-06
    - https://groups.google.com/forum/#!msg/ruby-security-ann/YMnKFsASOAE/Fw3ocLI0BQAJ

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/rexical/CVE-2019-5477.yml