Lucene search

K
githubGitHub Advisory DatabaseGHSA-4FVG-PWV7-V54G
HistoryMay 17, 2022 - 1:36 a.m.

Karteek Docsplit vulnerable to OS Command Injection

2022-05-1701:36:24
CWE-78
GitHub Advisory Database
github.com
10

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

69.4%

The extract_from_ocr function in lib/docsplit/text_extractor.rb in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.

Affected configurations

Vulners
Node
karteekdocsplitRange≀0.5.4
CPENameOperatorVersion
karteek-docsplitle0.5.4

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

69.4%