First published: Thu Apr 25 2013(Updated: )
`converter.rb` in the md2pdf gem 0.0.1 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/md2pdf | <=0.0.1 | |
md2pdf | =0.0.1 | |
Ruby |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1948 has a high severity rating due to its potential for arbitrary command execution.
To fix CVE-2013-1948, it is recommended to upgrade to a version of the md2pdf gem that is higher than 0.0.1.
Users of the md2pdf gem version 0.0.1 are affected by CVE-2013-1948.
CVE-2013-1948 is a command injection vulnerability caused by improper handling of filenames.
The vulnerable software includes the md2pdf gem, specifically version 0.0.1.