CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
52.5%
Ruby Gem Fileutils prior to v0.7.1 contains a Command Injection vulnerability in user supplied url variable that is passed to the shell.
Vendor | Product | Version | CPE |
---|---|---|---|
fileutils_project | fileutils | * | cpe:2.3:a:fileutils_project:fileutils:*:*:*:*:*:ruby:*:* |
rubygems.org/gems/fileutils
www.vapidlabs.com/advisory.php?v=36
bugs.ruby-lang.org/issues/7958
github.com/advisories/GHSA-9x97-x2p9-hvpf
github.com/ruby/fileutils/commit/994c7aa1ba391689f844a069b9aee9e49813686c
github.com/rubysec/ruby-advisory-db/blob/master/gems/fileutils/CVE-2013-2516.yml
nvd.nist.gov/vuln/detail/CVE-2013-2516
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
52.5%