Vulnerability CVE-2013-2090


Published: 2014-05-27

Description:
The set_meta_data function in lib/cremefraiche.rb in the Creme Fraiche gem before 0.6.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the file name of an email attachment. NOTE: some of these details are obtained from third party information.

See advisories in our WLB2 database:
Topic
Author
Date
High
Creme Fraiche 0.6 Ruby Gem Remote command Injection
Larry W. Cashdol...
14.05.2013

Type:

CWE-78

(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') )

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Uplawski -> Creme fraiche 

 References:
http://xforce.iss.net/xforce/xfdb/84271
http://www.vapid.dhs.org/advisories/cremefraiche-cmd-inj.html
http://secunia.com/advisories/53391
http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html
http://osvdb.org/93395

Copyright 2024, cxsecurity.com

 

Back to Top