Lucene search

K
rubygemsRubySecRUBY:SFPAGENT-2014-2888-105971
HistoryApr 15, 2014 - 8:00 p.m.

sfpagent Gem for Ruby JSON[body] Module Name Remote Command Execution

2014-04-1520:00:00
RubySec
rubysec.com
4

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

sfpagent Gem for Ruby contains a flaw that is triggered as JSON[body]
input is not properly sanitized when handling module names with shell
metacharacters. This may allow a context-dependent attacker to execute
arbitrary commands.

Affected configurations

Vulners
Node
rubysfpagentRange<0.4.15

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Related for RUBY:SFPAGENT-2014-2888-105971