Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. sprout
  4. ›
  5. CVE-2013-6421

CVE-2013-6421: Command injection vulnerability

December 12, 2013 (updated December 19, 2013)

The unpack_zip function in archive_unpacker.rb in the sprout gem for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename or path.

References

  • cxsecurity.com/issue/WLB-2013120023
  • github.com/lukebayes/project-sprouts/blob/e8e6c60438cd1a4d598645760b00ea005eb1cc2c/lib/sprout/archive_unpacker.rb

Code Behaviors & Features

Detect and mitigate CVE-2013-6421 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.7.0

Solution

There is no solution for the moment.

Impact 7.5 HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

gem/sprout/CVE-2013-6421.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:02 +0000.