First published: Thu Aug 29 2013(Updated: )
lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/sounder | <1.0.2 | 1.0.2 |
adam zaninovich sounder | =1.0.1 | |
Ruby |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5647 has been classified as a high severity vulnerability due to its ability to allow remote command execution.
To fix CVE-2013-5647, upgrade the sounder gem to version 1.0.2 or later to mitigate the vulnerability.
Versions of the sounder gem prior to 1.0.2, specifically version 1.0.1, are affected by CVE-2013-5647.
CVE-2013-5647 allows remote attackers to execute arbitrary commands by exploiting shell metacharacters in filenames.
The impact of CVE-2013-5647 is significant, as it can lead to unauthorized access and control of the affected Ruby applications.