9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.003 Low
EPSS
Percentile
69.4%
The extract_from_ocr
function in lib/docsplit/text_extractor.rb
in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.
CPE | Name | Operator | Version |
---|---|---|---|
karteek-docsplit | le | 0.5.4 |
vapid.dhs.org/advisories/karteek-docsplit-cmd-inject.html
www.openwall.com/lists/oss-security/2013/04/08/15
exchange.xforce.ibmcloud.com/vulnerabilities/83277
github.com/advisories/GHSA-4fvg-pwv7-v54g
github.com/rubysec/ruby-advisory-db/blob/master/gems/karteek-docsplit/CVE-2013-1933.yml
nvd.nist.gov/vuln/detail/CVE-2013-1933