Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

Related vulnerabilities

GSD-2013-6421

Vulnerability from gsd - Updated: 2013-12-02 00:00
Details
sprout Gem for Ruby contains a flaw in the unpack_zip() function in archive_unpacker.rb. The issue is due to the program failing to properly sanitize input passed via the 'zip_file', 'dir', 'zip_name', and 'output' parameters. This may allow a context-dependent attacker to execute arbitrary code.
Aliases

{
  "GSD": {
    "alias": "CVE-2013-6421",
    "description": "The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.",
    "id": "GSD-2013-6421"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "affected": [
        {
          "package": {
            "ecosystem": "RubyGems",
            "name": "sprout",
            "purl": "pkg:gem/sprout"
          }
        }
      ],
      "aliases": [
        "CVE-2013-6421",
        "OSVDB-100598"
      ],
      "details": "sprout Gem for Ruby contains a flaw in the unpack_zip() function in\narchive_unpacker.rb. The issue is due to the program failing to properly\nsanitize input passed via the \u0027zip_file\u0027, \u0027dir\u0027, \u0027zip_name\u0027, and \u0027output\u0027\nparameters. This may allow a context-dependent attacker to execute arbitrary\ncode.\n",
      "id": "GSD-2013-6421",
      "modified": "2013-12-02T00:00:00.000Z",
      "published": "2013-12-02T00:00:00.000Z",
      "references": [
        {
          "type": "WEB",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6421"
        }
      ],
      "schema_version": "1.4.0",
      "severity": [
        {
          "score": 7.5,
          "type": "CVSS_V2"
        }
      ],
      "summary": "sprout Gem for Ruby archive_unpacker.rb unpack_zip() Function Multiple Parameter Arbitrary Code Execution"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2013-6421",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "20131214 Command injection vulnerability in Ruby Gem sprout 0.7.246",
            "refsource": "BUGTRAQ",
            "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html"
          },
          {
            "name": "[oss-security] 20131202 Command injection vulnerability in Ruby Gem sprout 0.7.246",
            "refsource": "MLIST",
            "url": "http://www.openwall.com/lists/oss-security/2013/12/03/1"
          },
          {
            "name": "[oss-security] 20131202 Re: Command injection vulnerability in Ruby Gem sprout 0.7.246",
            "refsource": "MLIST",
            "url": "http://www.openwall.com/lists/oss-security/2013/12/03/6"
          },
          {
            "name": "http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html",
            "refsource": "MISC",
            "url": "http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html"
          }
        ]
      }
    },
    "github.com/rubysec/ruby-advisory-db": {
      "cve": "2013-6421",
      "cvss_v2": 7.5,
      "date": "2013-12-02",
      "description": "sprout Gem for Ruby contains a flaw in the unpack_zip() function in\narchive_unpacker.rb. The issue is due to the program failing to properly\nsanitize input passed via the \u0027zip_file\u0027, \u0027dir\u0027, \u0027zip_name\u0027, and \u0027output\u0027\nparameters. This may allow a context-dependent attacker to execute arbitrary\ncode.\n",
      "gem": "sprout",
      "osvdb": 100598,
      "title": "sprout Gem for Ruby archive_unpacker.rb unpack_zip() Function Multiple Parameter Arbitrary Code Execution",
      "unaffected_versions": [
        "\u003c 0.7.246"
      ],
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6421"
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003e=0.7.0",
          "affected_versions": "All versions starting from 0.7.0",
          "credit": "Larry W. Cashdollar",
          "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "cwe_ids": [
            "CWE-1035",
            "CWE-937",
            "CWE-94"
          ],
          "date": "2013-12-19",
          "description": "The `unpack_zip` function in `archive_unpacker.rb` in the sprout gem for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename or path.",
          "fixed_versions": [],
          "identifier": "CVE-2013-6421",
          "identifiers": [
            "CVE-2013-6421"
          ],
          "not_impacted": "0.3 and 0.5 branches",
          "package_slug": "gem/sprout",
          "pubdate": "2013-12-12",
          "solution": "There is no solution for the moment.",
          "title": "Command injection vulnerability",
          "urls": [
            "http://cxsecurity.com/issue/WLB-2013120023",
            "https://github.com/lukebayes/project-sprouts/blob/e8e6c60438cd1a4d598645760b00ea005eb1cc2c/lib/sprout/archive_unpacker.rb#L90"
          ],
          "uuid": "580566b5-ef09-4a88-9b9d-1f88705d43f8"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:projectsprouts:sprout:0.7.246:-:-:*:-:ruby:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-6421"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-94"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20131202 Re: Command injection vulnerability in Ruby Gem sprout 0.7.246",
              "refsource": "MLIST",
              "tags": [
                "Exploit"
              ],
              "url": "http://www.openwall.com/lists/oss-security/2013/12/03/6"
            },
            {
              "name": "http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html",
              "refsource": "MISC",
              "tags": [
                "Exploit"
              ],
              "url": "http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html"
            },
            {
              "name": "[oss-security] 20131202 Command injection vulnerability in Ruby Gem sprout 0.7.246",
              "refsource": "MLIST",
              "tags": [
                "Exploit"
              ],
              "url": "http://www.openwall.com/lists/oss-security/2013/12/03/1"
            },
            {
              "name": "20131214 Command injection vulnerability in Ruby Gem sprout 0.7.246",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 10.0,
          "impactScore": 6.4,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "HIGH",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2013-12-20T04:38Z",
      "publishedDate": "2013-12-12T18:55Z"
    }
  }
}