Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. rgpg
  4. ›
  5. CVE-2013-4203

CVE-2013-4203: Remote Command Injection

October 11, 2013 (updated October 15, 2013)

Some code does not sanitize user supplied input before passing it to the System() function for execution. If this API is used in the context of a RoR application remote commands can be injected into the shell if the user supplies shell meta characters like ; and &.

References

  • vapid.dhs.org/advisories/rgpg-api-rubygem-cmd-inj.html

Code Behaviors & Features

Detect and mitigate CVE-2013-4203 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.2.3

Fixed versions

  • 0.2.3

Solution

Update to 0.2.3

Impact 7.5 HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

gem/rgpg/CVE-2013-4203.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:42 +0000.