pdf_info 0.5.3 is vulnerable to Command Execution because the Ruby code uses backticks instead of Open3.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://rubygems.org/gems/pdf_info | product |
https://github.com/affix/CVE-2022-36231 | third party advisory exploit |
https://github.com/newspaperclub/pdf_info/pull/15 | patch |
https://github.com/newspaperclub/pdf_info/issues/16 | patch |