First published: Wed Mar 20 2013(Updated: )
command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubygems Command Wrap | ||
rubygems/command_wrap | <=0.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1875 is considered a critical vulnerability due to its potential for remote command execution.
The fix for CVE-2013-1875 involves upgrading the command_wrap Gem to version 0.6.3 or later.
CVE-2013-1875 affects all applications using the command_wrap Gem up to version 0.6.2.
Attackers can exploit CVE-2013-1875 to execute arbitrary commands on the server by manipulating URLs or filenames.
A temporary workaround for CVE-2013-1875 includes sanitizing input to remove shell metacharacters to prevent command execution.