Ruby prior to 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ruby-lang ruby 2.5.0 |
||
ruby-lang ruby |
||
debian debian linux 7.0 |
||
debian debian linux 9.0 |
||
debian debian linux 8.0 |
||
redhat enterprise linux server aus 7.4 |
||
redhat enterprise linux server eus 7.4 |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux server 7.0 |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux server eus 7.6 |
||
redhat enterprise linux server tus 7.4 |
||
redhat enterprise linux server tus 7.6 |
||
redhat enterprise linux server aus 7.6 |
||
redhat enterprise linux server eus 7.5 |