Note:
This project will be discontinued after December 13, 2021. [more]
2020-02-24
There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
Products | Ubuntu_linux, Debian_linux, Fedora, Leap, Rake |
Type | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78) |
First patch | - None (likely due to unavailable code) |
Links |
• https://usn.ubuntu.com/4295-1/
• http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/ • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/ • https://hackerone.com/reports/651518 |