First published: Thu Apr 25 2013(Updated: )
kelredd-pruview gem 0.3.8 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument to (1) document.rb, (2) video.rb, or (3) video_image.rb.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
kelredd-pruview | =0.3.8 | |
Ruby |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1947 is classified as a high severity vulnerability due to its potential for arbitrary command execution.
To fix CVE-2013-1947, upgrade the kelredd-pruview gem to version 0.3.9 or later where the vulnerability is addressed.
Users of the kelredd-pruview gem version 0.3.8 are primarily affected by CVE-2013-1947.
CVE-2013-1947 allows context-dependent attackers to execute arbitrary commands by exploiting shell metacharacters in filenames.
More information on CVE-2013-1947 can typically be found in security bulletins or the National Vulnerability Database.