Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method
Reporter | Title | Published | Views | Family All 129 |
---|---|---|---|---|
![]() | Arbitrary Code Execution | 21 Sep 202006:33 | – | veracode |
![]() | A code injection vulnerability of Shell#[] and Shell#test | 30 Sep 201921:00 | – | rubygems |
![]() | CVE-2019-16255 | 26 Nov 201918:15 | – | alpinelinux |
![]() | CVE-2019-16255 | 26 Nov 201900:00 | – | cvelist |
![]() | CVE-2019-16255 | 30 Mar 202008:17 | – | redhatcve |
![]() | Linux Distros Unpatched Vulnerability : CVE-2019-16255 | 4 Mar 202500:00 | – | nessus |
![]() | EulerOS 2.0 SP5 : ruby (EulerOS-SA-2020-1324) | 23 Mar 202000:00 | – | nessus |
![]() | Photon OS 2.0: Ruby PHSA-2019-2.0-0196 | 16 Jan 202000:00 | – | nessus |
![]() | Photon OS 1.0: Ruby PHSA-2019-1.0-0263 | 16 Jan 202000:00 | – | nessus |
![]() | Photon OS 3.0: Ruby PHSA-2020-3.0-0047 | 18 Jan 202000:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo