CVE-2013-7086
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
19/12/2013
Last modified:
11/04/2025
Description
The message function in lib/webbynode/notify.rb in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:webbynode:webbynode:*:-:-:*:-:ruby:*:* | 1.0.5.3 (including) | |
cpe:2.3:a:webbynode:webbynode:1.0.5:-:-:*:-:ruby:*:* | ||
cpe:2.3:a:webbynode:webbynode:1.0.5.1:-:-:*:-:ruby:*:* | ||
cpe:2.3:a:webbynode:webbynode:1.0.5.2:-:-:*:-:ruby:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2013-12/0079.html
- http://osvdb.org/100920
- http://packetstormsecurity.com/files/124421
- http://seclists.org/oss-sec/2013/q4/493
- http://seclists.org/oss-sec/2013/q4/497
- http://www.securityfocus.com/bid/64289
- http://www.vapid.dhs.org/advisories/webbynode-command-inj.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89705
- https://github.com/webbynode/webbynode/pull/85
- http://archives.neohapsis.com/archives/bugtraq/2013-12/0079.html
- http://osvdb.org/100920
- http://packetstormsecurity.com/files/124421
- http://seclists.org/oss-sec/2013/q4/493
- http://seclists.org/oss-sec/2013/q4/497
- http://www.securityfocus.com/bid/64289
- http://www.vapid.dhs.org/advisories/webbynode-command-inj.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89705
- https://github.com/webbynode/webbynode/pull/85