[FREEBSD:DD644964-E10E-11E7-8097-0800271D4B9C] ruby -- Command injection vulnerability in Net::FTP
Severity
High
Affected Packages
1
CVEs
1
Etienne Stalmans from the Heroku product security team reports:
There is a command injection vulnerability in Net::FTP bundled with Ruby.
Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the pipe character "|", the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
Package | Affected Version |
---|---|
pkg:freebsd/ruby | < 2.2.9,1 |
- ID
- FREEBSD:DD644964-E10E-11E7-8097-0800271D4B9C
- Severity
- high
- Severity from
- CVE-2017-17405
- URL
- http://vuxml.freebsd.org/freebsd/dd644964-e10e-11e7-8097-0800271d4b9c.html
- Published
-
2017-12-14T00:00:00
(6 years ago) - Modified
-
2017-12-14T00:00:00
(6 years ago) - Rights
- FreeBSD VuXML Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
FreeBSD VuXML | https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:freebsd/ruby | ruby | < 2.2.9,1 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |