The flash_tool gem through 0.6.0 for Ruby allows command execution via shell metacharacters in the name of a downloaded file.
References
Link | Resource |
---|---|
https://github.com/advisories/GHSA-6325-6g32-7p35 | Third Party Advisory |
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/flash_tool/CVE-2013-2513.yml | Third Party Advisory |
Configurations
History
14 Dec 2023, 20:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:milboj:flash_tool:*:*:*:*:*:ruby:*:* | |
First Time |
Milboj flash Tool
Milboj |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/rubysec/ruby-advisory-db/blob/master/gems/flash_tool/CVE-2013-2513.yml - Third Party Advisory | |
References | () https://github.com/advisories/GHSA-6325-6g32-7p35 - Third Party Advisory | |
CWE | CWE-77 |
12 Dec 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-12 16:15
Updated : 2023-12-14 20:35
NVD link : CVE-2013-2513
Mitre link : CVE-2013-2513
JSON object : View
Products Affected
milboj
- flash_tool
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')