First published: Thu Apr 25 2013(Updated: )
The `extract_from_ocr` function in `lib/docsplit/text_extractor.rb` in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/karteek-docsplit | <=0.5.4 | |
DocumentCloud | =0.5.4 | |
Ruby |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1933 has a medium severity level due to its potential for command injection attacks.
To fix CVE-2013-1933, upgrade the Karteek Docsplit gem to a later version than 0.5.4.
The vulnerability occurs due to lack of proper sanitization of PDF filenames in the extract_from_ocr function.
Users of the Karteek Docsplit gem version 0.5.4 for Ruby are affected by CVE-2013-1933.
CVE-2013-1933 allows attackers to execute arbitrary commands via shell metacharacters in a PDF filename.