Vulnerability Description
converter.rb in the md2pdf gem 0.0.1 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rob Westgeest | Md2Pdf | 0.0.1 |
| Ruby-Lang | Ruby | All versions |
References
- http://osvdb.org/92290
- http://vapid.dhs.org/advisories/md2pdf-remote-exec.html
- http://www.securityfocus.com/bid/59061
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83416
- http://osvdb.org/92290
- http://vapid.dhs.org/advisories/md2pdf-remote-exec.html
- http://www.securityfocus.com/bid/59061
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83416
FAQ
What is CVE-2013-1948?
CVE-2013-1948 is a vulnerability with a CVSS score of 10.0 (HIGH). converter.rb in the md2pdf gem 0.0.1 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.
How severe is CVE-2013-1948?
CVE-2013-1948 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1948?
Check the references section above for vendor advisories and patch information. Affected products include: Rob Westgeest Md2Pdf, Ruby-Lang Ruby.