Sha256: 833fbc4355c8d546e05bf55973e0dc66b92deafc7b461f8e2b3253ead7c24a77

Contents?: true

Size: 772 Bytes

Versions: 1

Compression:

Stored size: 772 Bytes

Contents

---
engine: ruby
cve: 2019-16255
url: https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/
title: A code injection vulnerability of Shell#[] and Shell#test
date: 2019-10-01
description: |
  Shell#[] and its alias Shell#test defined in lib/shell.rb allow code
  injection if the first argument (aka the “command” argument) is untrusted
  data. An attacker can exploit this to call an arbitrary Ruby method.

  Note that passing untrusted data to methods of Shell is dangerous in general.
  Users must never do it. However, we treat this particular case as a
  vulnerability because the purpose of Shell#[] and Shell#[] is considered file
  testing.
patched_versions:
  - "~> 2.4.8"
  - "~> 2.5.7"
  - "~> 2.6.5"
  - "> 2.7.0-preview1"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/rubies/ruby/CVE-2019-16255.yml