Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
Related vulnerabilities
GSD-2013-6421
Vulnerability from gsd - Updated: 2013-12-02 00:00Details
sprout Gem for Ruby contains a flaw in the unpack_zip() function in
archive_unpacker.rb. The issue is due to the program failing to properly
sanitize input passed via the 'zip_file', 'dir', 'zip_name', and 'output'
parameters. This may allow a context-dependent attacker to execute arbitrary
code.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2013-6421",
"description": "The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.",
"id": "GSD-2013-6421"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "sprout",
"purl": "pkg:gem/sprout"
}
}
],
"aliases": [
"CVE-2013-6421",
"OSVDB-100598"
],
"details": "sprout Gem for Ruby contains a flaw in the unpack_zip() function in\narchive_unpacker.rb. The issue is due to the program failing to properly\nsanitize input passed via the \u0027zip_file\u0027, \u0027dir\u0027, \u0027zip_name\u0027, and \u0027output\u0027\nparameters. This may allow a context-dependent attacker to execute arbitrary\ncode.\n",
"id": "GSD-2013-6421",
"modified": "2013-12-02T00:00:00.000Z",
"published": "2013-12-02T00:00:00.000Z",
"references": [
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6421"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": 7.5,
"type": "CVSS_V2"
}
],
"summary": "sprout Gem for Ruby archive_unpacker.rb unpack_zip() Function Multiple Parameter Arbitrary Code Execution"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6421",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20131214 Command injection vulnerability in Ruby Gem sprout 0.7.246",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html"
},
{
"name": "[oss-security] 20131202 Command injection vulnerability in Ruby Gem sprout 0.7.246",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/12/03/1"
},
{
"name": "[oss-security] 20131202 Re: Command injection vulnerability in Ruby Gem sprout 0.7.246",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/12/03/6"
},
{
"name": "http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html",
"refsource": "MISC",
"url": "http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html"
}
]
}
},
"github.com/rubysec/ruby-advisory-db": {
"cve": "2013-6421",
"cvss_v2": 7.5,
"date": "2013-12-02",
"description": "sprout Gem for Ruby contains a flaw in the unpack_zip() function in\narchive_unpacker.rb. The issue is due to the program failing to properly\nsanitize input passed via the \u0027zip_file\u0027, \u0027dir\u0027, \u0027zip_name\u0027, and \u0027output\u0027\nparameters. This may allow a context-dependent attacker to execute arbitrary\ncode.\n",
"gem": "sprout",
"osvdb": 100598,
"title": "sprout Gem for Ruby archive_unpacker.rb unpack_zip() Function Multiple Parameter Arbitrary Code Execution",
"unaffected_versions": [
"\u003c 0.7.246"
],
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6421"
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=0.7.0",
"affected_versions": "All versions starting from 0.7.0",
"credit": "Larry W. Cashdollar",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cwe_ids": [
"CWE-1035",
"CWE-937",
"CWE-94"
],
"date": "2013-12-19",
"description": "The `unpack_zip` function in `archive_unpacker.rb` in the sprout gem for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename or path.",
"fixed_versions": [],
"identifier": "CVE-2013-6421",
"identifiers": [
"CVE-2013-6421"
],
"not_impacted": "0.3 and 0.5 branches",
"package_slug": "gem/sprout",
"pubdate": "2013-12-12",
"solution": "There is no solution for the moment.",
"title": "Command injection vulnerability",
"urls": [
"http://cxsecurity.com/issue/WLB-2013120023",
"https://github.com/lukebayes/project-sprouts/blob/e8e6c60438cd1a4d598645760b00ea005eb1cc2c/lib/sprout/archive_unpacker.rb#L90"
],
"uuid": "580566b5-ef09-4a88-9b9d-1f88705d43f8"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:projectsprouts:sprout:0.7.246:-:-:*:-:ruby:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6421"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20131202 Re: Command injection vulnerability in Ruby Gem sprout 0.7.246",
"refsource": "MLIST",
"tags": [
"Exploit"
],
"url": "http://www.openwall.com/lists/oss-security/2013/12/03/6"
},
{
"name": "http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html"
},
{
"name": "[oss-security] 20131202 Command injection vulnerability in Ruby Gem sprout 0.7.246",
"refsource": "MLIST",
"tags": [
"Exploit"
],
"url": "http://www.openwall.com/lists/oss-security/2013/12/03/1"
},
{
"name": "20131214 Command injection vulnerability in Ruby Gem sprout 0.7.246",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2013-12-20T04:38Z",
"publishedDate": "2013-12-12T18:55Z"
}
}
}