cve/2013/CVE-2013-2516.md

18 lines
736 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2013-2516](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2516)
![](https://img.shields.io/static/v1?label=Product&message=FileUtils&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%200.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Fileutils%200.7%20Ruby%20Gem%20remote%20command%20execution%20and%20insecure%20file%20handling%20in%20%2Ftmp&color=brighgreen)
### Description
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.
### POC
#### Reference
- http://www.vapidlabs.com/advisory.php?v=36
#### Github
No PoCs found on GitHub currently.