CVE-2013-2090
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
27/05/2014
Last modified:
12/04/2025
Description
The set_meta_data function in lib/cremefraiche.rb in the Creme Fraiche gem before 0.6.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the file name of an email attachment. NOTE: some of these details are obtained from third party information.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:uplawski:creme_fraiche:*:*:*:*:*:ruby:*:* | 0.6 (including) | |
| cpe:2.3:a:uplawski:creme_fraiche:0.4.5:*:*:*:*:ruby:*:* | ||
| cpe:2.3:a:uplawski:creme_fraiche:0.4.5.1:*:*:*:*:ruby:*:* | ||
| cpe:2.3:a:uplawski:creme_fraiche:0.4.5.2:*:*:*:*:ruby:*:* | ||
| cpe:2.3:a:uplawski:creme_fraiche:0.4.5.4:*:*:*:*:ruby:*:* | ||
| cpe:2.3:a:uplawski:creme_fraiche:0.4.5.5:*:*:*:*:ruby:*:* | ||
| cpe:2.3:a:uplawski:creme_fraiche:0.4.5.6:*:*:*:*:ruby:*:* | ||
| cpe:2.3:a:uplawski:creme_fraiche:0.5:*:*:*:*:ruby:*:* | ||
| cpe:2.3:a:uplawski:creme_fraiche:0.5.1:*:*:*:*:ruby:*:* | ||
| cpe:2.3:a:uplawski:creme_fraiche:0.5.2:*:*:*:*:ruby:*:* | ||
| cpe:2.3:a:uplawski:creme_fraiche:0.5.3:*:*:*:*:ruby:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/93395
- http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html
- http://secunia.com/advisories/53391
- http://www.vapid.dhs.org/advisories/cremefraiche-cmd-inj.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84271
- http://osvdb.org/93395
- http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html
- http://secunia.com/advisories/53391
- http://www.vapid.dhs.org/advisories/cremefraiche-cmd-inj.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84271



