There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://hackerone.com/reports/651518 | patch third party advisory exploit |
https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html | third party advisory mailing list |
https://usn.ubuntu.com/4295-1/ | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html | vendor advisory mailing list third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/ | vendor advisory |