Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. ldoce
  4. ›
  5. CVE-2013-1911

CVE-2013-1911: Remote command execution in Ruby Gem ldoce

April 2, 2013 (updated August 28, 2017)

The package ldoce passes a URL to commandline for audio output of the pronunciation of a dictonary word. If the URL contains a shell metacharacter, arbitrary code can be executed remotely as the client.

References

  • otiose.dhs.org/advisories/ldoce-0.0.2-cmd-exec.html
  • web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1911

Code Behaviors & Features

Detect and mitigate CVE-2013-1911 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.0.2

Solution

No solution yet.

Impact 6.8 MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

gem/ldoce/CVE-2013-1911.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:47 +0000.