Sha256: c209357f3517b46b5e45f63be3077d9d6ed39d8edc3e78bd48e2acf012aeca8a

Contents?: true

Size: 469 Bytes

Versions: 1

Compression:

Stored size: 469 Bytes

Contents

---
gem: slanger
cve: 2019-1010306
ghsa: rg32-m3hf-772v
url: https://github.com/stevegraham/slanger/pull/238
date: 2019-07-16
title: Arbitrary command execution in slanger
description: |
  A remote attacker can execute arbitrary commands by sending a crafted request to the server.

  This is due to the use of `Oj.load` instead of `Oj.strict_load` when processing messages.

  Note that `slanger` is no longer maintained.
patched_versions:
  - ">= 0.6.1"
cvss_v3: 9.8

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/slanger/CVE-2019-1010306.yml