Vulnerability Description
lib/ldoce/word.rb in the ldoce 0.0.2 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in (1) an mp3 URL or (2) file name.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mark Burns | Ldoce | 0.0.2 |
| Ruby-Lang | Ruby | All versions |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2013-04/0010.htmlExploit
- http://osvdb.org/91870
- http://otiose.dhs.org/advisories/ldoce-0.0.2-cmd-exec.htmlExploit
- http://www.openwall.com/lists/oss-security/2013/03/31/3Exploit
- http://www.securityfocus.com/bid/58783Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83163
- http://archives.neohapsis.com/archives/bugtraq/2013-04/0010.htmlExploit
- http://osvdb.org/91870
- http://otiose.dhs.org/advisories/ldoce-0.0.2-cmd-exec.htmlExploit
- http://www.openwall.com/lists/oss-security/2013/03/31/3Exploit
- http://www.securityfocus.com/bid/58783Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83163
FAQ
What is CVE-2013-1911?
CVE-2013-1911 is a vulnerability with a CVSS score of 6.8 (MEDIUM). lib/ldoce/word.rb in the ldoce 0.0.2 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in (1) an mp3 URL or (2) file name.
How severe is CVE-2013-1911?
CVE-2013-1911 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1911?
Check the references section above for vendor advisories and patch information. Affected products include: Mark Burns Ldoce, Ruby-Lang Ruby.