### [CVE-2013-2516](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2516) ![](https://img.shields.io/static/v1?label=Product&message=FileUtils&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%200.7%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Fileutils%200.7%20Ruby%20Gem%20remote%20command%20execution%20and%20insecure%20file%20handling%20in%20%2Ftmp&color=brighgreen) ### Description Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell. ### POC #### Reference - http://www.vapidlabs.com/advisory.php?v=36 - http://www.vapidlabs.com/advisory.php?v=36 #### Github No PoCs found on GitHub currently.