First published: Fri Feb 15 2019(Updated: )
Ruby Gem Fileutils prior to v0.7.1 contains a Command Injection vulnerability in user supplied url variable that is passed to the shell.
Credit: larry0@me.com larry0@me.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/fileutils | <0.7.1 | 0.7.1 |
Fileutils project Fileutils Ruby | <=0.7 | |
GNU Fileutils | <=0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2516 has a moderate severity level due to its potential for command injection.
To fix CVE-2013-2516, update the Fileutils Ruby Gem to version 0.7.1 or higher.
CVE-2013-2516 affects systems using Fileutils Ruby Gem versions 0.7 or lower.
Yes, CVE-2013-2516 can be exploited remotely if the vulnerable Fileutils version is used in a web application.
The impact of CVE-2013-2516 includes unauthorized command execution on the system where the vulnerable gem is used.