Sha256: db7797396cce302c97cb21cb37fea52d20c96a6f65a6b0bc8bea0cadf3b44863
Contents?: true
Size: 600 Bytes
Versions: 1
Compression:
Stored size: 600 Bytes
Contents
--- gem: sprout cve: 2013-6421 osvdb: 100598 url: https://nvd.nist.gov/vuln/detail/CVE-2013-6421 title: sprout Gem for Ruby archive_unpacker.rb unpack_zip() Function Multiple Parameter Arbitrary Code Execution date: 2013-12-02 description: | sprout Gem for Ruby contains a flaw in the unpack_zip() function in archive_unpacker.rb. The issue is due to the program failing to properly sanitize input passed via the 'zip_file', 'dir', 'zip_name', and 'output' parameters. This may allow a context-dependent attacker to execute arbitrary code. cvss_v2: 7.5 unaffected_versions: - '< 0.7.246'
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/sprout/CVE-2013-6421.yml |