[FREEBSD:DD644964-E10E-11E7-8097-0800271D4B9C] ruby -- Command injection vulnerability in Net::FTP

Severity High
Affected Packages 1
CVEs 1

Etienne Stalmans from the Heroku product security team reports:

  There is a command injection vulnerability in Net::FTP bundled with Ruby.
  Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file.  If the localfile argument starts with the pipe character "|", the command following the pipe character is executed.  The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
Package Affected Version
pkg:freebsd/ruby < 2.2.9,1
ID
FREEBSD:DD644964-E10E-11E7-8097-0800271D4B9C
Severity
high
Severity from
CVE-2017-17405
URL
http://vuxml.freebsd.org/freebsd/dd644964-e10e-11e7-8097-0800271d4b9c.html
Published
2017-12-14T00:00:00
(6 years ago)
Modified
2017-12-14T00:00:00
(6 years ago)
Rights
FreeBSD VuXML Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:freebsd/ruby ruby < 2.2.9,1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...