The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2017/02/02/5 | mailing list third party advisory patch |
http://www.openwall.com/lists/oss-security/2017/01/31/14 | mailing list third party advisory patch |
https://github.com/dejan/espeak-ruby/issues/7 | mailing list third party advisory patch |