### [CVE-2013-6421](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6421) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path. ### POC #### Reference - http://www.openwall.com/lists/oss-security/2013/12/03/1 - http://www.openwall.com/lists/oss-security/2013/12/03/1 - http://www.openwall.com/lists/oss-security/2013/12/03/6 - http://www.openwall.com/lists/oss-security/2013/12/03/6 #### Github - https://github.com/btihen/calendar_commons - https://github.com/tdunning/github-advisory-parser - https://github.com/thesp0nge/dawnscanner