Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

Related vulnerabilities

GSD-2015-7541

Vulnerability from gsd - Updated: 2016-01-04 00:00
Details
The contents of the `image_path`, `colors`, and `depth` variables generated from possibly user-supplied input are passed directly to the shell via `convert ...`. If a user supplies a value that includes shell metacharacters such as ';', an attacker may be able to execute shell commands on the remote system as the user id of the Ruby process. To resolve this issue, the aforementioned variables (especially `image_path`) must be sanitized for shell metacharacters.
Aliases

{
  "GSD": {
    "alias": "CVE-2015-7541",
    "description": "The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable.",
    "id": "GSD-2015-7541"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "affected": [
        {
          "package": {
            "ecosystem": "RubyGems",
            "name": "colorscore",
            "purl": "pkg:gem/colorscore"
          }
        }
      ],
      "aliases": [
        "CVE-2015-7541",
        "OSVDB-132516",
        "GHSA-73qw-ww62-m54x"
      ],
      "details": "The contents of the `image_path`, `colors`, and `depth` variables generated\nfrom possibly user-supplied input are passed directly to the shell via\n`convert ...`.\n\nIf a user supplies a value that includes shell metacharacters such as \u0027;\u0027, an\nattacker may be able to execute shell commands on the remote system as the\nuser id of the Ruby process.\n\nTo resolve this issue, the aforementioned variables (especially `image_path`)\nmust be sanitized for shell metacharacters.\n",
      "id": "GSD-2015-7541",
      "modified": "2016-01-04T00:00:00.000Z",
      "published": "2016-01-04T00:00:00.000Z",
      "references": [
        {
          "type": "WEB",
          "url": "http://seclists.org/oss-sec/2016/q1/17"
        }
      ],
      "schema_version": "1.4.0",
      "severity": [
        {
          "score": 10.0,
          "type": "CVSS_V3"
        }
      ],
      "summary": "colorscore Gem for Ruby lib/colorscore/histogram.rb Arbitrary Command Injection"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2015-7541",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://rubysec.com/advisories/CVE-2015-7541/",
            "refsource": "MISC",
            "url": "http://rubysec.com/advisories/CVE-2015-7541/"
          },
          {
            "name": "[oss-security] 20160104 Remote Command Injection in Ruby Gem colorscore \u003c=0.0.4",
            "refsource": "MLIST",
            "url": "http://www.openwall.com/lists/oss-security/2016/01/05/2"
          },
          {
            "name": "https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718",
            "refsource": "CONFIRM",
            "url": "https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718"
          }
        ]
      }
    },
    "github.com/rubysec/ruby-advisory-db": {
      "cve": "2015-7541",
      "cvss_v3": 10.0,
      "date": "2016-01-04",
      "description": "The contents of the `image_path`, `colors`, and `depth` variables generated\nfrom possibly user-supplied input are passed directly to the shell via\n`convert ...`.\n\nIf a user supplies a value that includes shell metacharacters such as \u0027;\u0027, an\nattacker may be able to execute shell commands on the remote system as the\nuser id of the Ruby process.\n\nTo resolve this issue, the aforementioned variables (especially `image_path`)\nmust be sanitized for shell metacharacters.\n",
      "gem": "colorscore",
      "ghsa": "73qw-ww62-m54x",
      "osvdb": 132516,
      "patched_versions": [
        "\u003e= 0.0.5"
      ],
      "title": "colorscore Gem for Ruby lib/colorscore/histogram.rb Arbitrary Command Injection",
      "url": "http://seclists.org/oss-sec/2016/q1/17"
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003c=0.0.4",
          "affected_versions": "All versions up to 0.0.4",
          "credit": "Dirk Zittersteyn (@DZittersteyn)",
          "cvss_v2": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-77",
            "CWE-937"
          ],
          "date": "2016-01-18",
          "description": "The contents of the `image_path`, `colors`, and `depth` variables generated from possibly user-supplied input are passed directly to the shell. If a user supplies a value that includes shell metacharacters such as \u0027;\u0027, an attacker may be able to execute shell commands on the remote system as the user id of the Ruby process. ",
          "fixed_versions": [
            "0.0.5"
          ],
          "identifier": "CVE-2015-7541",
          "identifiers": [
            "CVE-2015-7541"
          ],
          "not_impacted": "All versions after 0.0.4",
          "package_slug": "gem/colorscore",
          "pubdate": "2016-01-08",
          "solution": "Upgrade to version 0.0.5 or above.",
          "title": "Arbitrary Command Injection",
          "urls": [
            "http://seclists.org/oss-sec/2016/q1/17",
            "https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718"
          ],
          "uuid": "c40816bd-14fd-4581-be2d-57172df989a0"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:colorscore_project:colorscore:*:*:*:*:*:ruby:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.0.4",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2015-7541"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-77"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20160104 Remote Command Injection in Ruby Gem colorscore \u003c=0.0.4",
              "refsource": "MLIST",
              "tags": [],
              "url": "http://www.openwall.com/lists/oss-security/2016/01/05/2"
            },
            {
              "name": "https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718",
              "refsource": "CONFIRM",
              "tags": [
                "Patch"
              ],
              "url": "https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718"
            },
            {
              "name": "http://rubysec.com/advisories/CVE-2015-7541/",
              "refsource": "MISC",
              "tags": [],
              "url": "http://rubysec.com/advisories/CVE-2015-7541/"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "exploitabilityScore": 10.0,
          "impactScore": 10.0,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "HIGH"
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 6.0
        }
      },
      "lastModifiedDate": "2016-01-18T11:55Z",
      "publishedDate": "2016-01-08T21:59Z"
    }
  }
}