First published: Wed Apr 03 2013(Updated: )
`lib/ldoce/word.rb` in the ldoce 0.0.2 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in (1) an mp3 URL or (2) file name.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/ldoce | <=0.0.2 | |
mark burns ldoce | =0.0.2 | |
Ruby |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1911 is considered critical due to its potential to allow remote command execution.
To fix CVE-2013-1911, update the ldoce gem to a version greater than 0.0.2.
CVE-2013-1911 affects the ldoce gem version 0.0.2 for Ruby.
Yes, CVE-2013-1911 can lead to data breaches as it allows attackers to execute arbitrary commands.
To mitigate risks, avoid using the vulnerable version of the ldoce gem and implement input validation to sanitize URLs and filenames.