0.003 Low
EPSS
Percentile
69.4%
The extract_from_ocr function in lib/docsplit/text_extractor.rb in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.
extract_from_ocr
lib/docsplit/text_extractor.rb
vapid.dhs.org/advisories/karteek-docsplit-cmd-inject.html
www.openwall.com/lists/oss-security/2013/04/08/15
exchange.xforce.ibmcloud.com/vulnerabilities/83277
github.com/rubysec/ruby-advisory-db/blob/master/gems/karteek-docsplit/CVE-2013-1933.yml
nvd.nist.gov/vuln/detail/CVE-2013-1933