The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html | mailing list |
http://www.openwall.com/lists/oss-security/2013/12/03/1 | mailing list exploit |
http://www.openwall.com/lists/oss-security/2013/12/03/6 | mailing list exploit |
http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html | exploit |