Sha256: 833fbc4355c8d546e05bf55973e0dc66b92deafc7b461f8e2b3253ead7c24a77
Contents?: true
Size: 772 Bytes
Versions: 1
Compression:
Stored size: 772 Bytes
Contents
--- engine: ruby cve: 2019-16255 url: https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/ title: A code injection vulnerability of Shell#[] and Shell#test date: 2019-10-01 description: | Shell#[] and its alias Shell#test defined in lib/shell.rb allow code injection if the first argument (aka the “command” argument) is untrusted data. An attacker can exploit this to call an arbitrary Ruby method. Note that passing untrusted data to methods of Shell is dangerous in general. Users must never do it. However, we treat this particular case as a vulnerability because the purpose of Shell#[] and Shell#[] is considered file testing. patched_versions: - "~> 2.4.8" - "~> 2.5.7" - "~> 2.6.5" - "> 2.7.0-preview1"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/rubies/ruby/CVE-2019-16255.yml |