9.3
CVSSv2

CVE-2013-1933

Published: 25/04/2013 Updated: 29/08/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The extract_from_ocr function in lib/docsplit/text_extractor.rb in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent malicious users to execute arbitrary commands via shell metacharacters in a PDF filename.

Vulnerable Product Search on Vulmon Subscribe to Product

documentcloud karteek-docsplit 0.5.4

Exploits

Ruby Gem Karteek Docsplit version 054 fails to sanitize user-supplied input If a user is tricked into extracting a file with shell characters in the name, code can be executed remotely ...