Plattform
ruby
Komponente
command_wrap
Behoben in
0.6.3
CVE-2013-1875 describes a Command Injection vulnerability found in the commandwrap Ruby gem. This flaw allows attackers to execute arbitrary commands on the system by injecting malicious shell metacharacters into URLs or filenames processed by the gem. The vulnerability affects versions of commandwrap prior to 0.6.2, and a fix is available in later versions.
The impact of CVE-2013-1875 is significant, as a successful exploit allows for complete command execution on the targeted system. An attacker could leverage this to gain unauthorized access, steal sensitive data, install malware, or even pivot to other systems within the network. The ability to inject shell metacharacters directly into the command execution pipeline bypasses typical input validation mechanisms, making exploitation relatively straightforward. This vulnerability shares similarities with other command injection flaws where improper sanitization of user-supplied input leads to arbitrary code execution.
CVE-2013-1875 was publicly disclosed in 2017. While no active exploitation campaigns are definitively confirmed, the ease of exploitation and the gem's potential use in various applications make it a persistent risk. There are publicly available proof-of-concept exploits demonstrating the vulnerability. It is not listed on the CISA KEV catalog as of this writing.
Applications utilizing the commandwrap gem in their Ruby code, particularly those that process user-supplied URLs or filenames without proper input validation, are at risk. This includes web applications, automation scripts, and any other Ruby-based tools that rely on commandwrap for command execution.
• ruby / gem: Use gem list to identify installed versions of command_wrap. Check for versions ≤0.6.2.
gem list command_wrap• ruby / gem: Inspect application code for usage of command_wrap where URLs or filenames are directly passed to shell commands without proper sanitization.
• ruby / system: Monitor system logs for unusual command execution patterns or suspicious processes spawned by Ruby applications using command_wrap.
discovery
disclosure
poc
Exploit-Status
EPSS
0.73% (73% Perzentil)
The primary mitigation for CVE-2013-1875 is to upgrade to a patched version of the commandwrap gem (version 0.6.2 or later). If upgrading is not immediately feasible, consider implementing input validation and sanitization on any user-supplied data passed to the commandwrap gem. Employing a Web Application Firewall (WAF) with rules to detect and block shell metacharacters in URLs and filenames can provide an additional layer of defense. Carefully review any code that utilizes command_wrap to ensure proper escaping and validation of input.
Kein offizieller Patch verfügbar. Prüfe auf Workarounds oder überwache auf Updates.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2013-1875 is a Command Injection vulnerability affecting versions of the command_wrap Ruby gem prior to 0.6.2. It allows attackers to execute arbitrary commands through URLs or filenames.
You are affected if your application uses the command_wrap gem and you are running a version equal to or less than 0.6.2. Check your gem versions immediately.
Upgrade to a patched version of the command_wrap gem (version 0.6.3 or later). If upgrading is not possible, implement strict input validation and sanitization.
While no active campaigns are publicly known, the vulnerability's ease of exploitation makes it a persistent risk. Proof-of-concept exploits are available.
Refer to the Ruby Security Advisory for details: https://rubysec.com/advisories/CVE-2013-1875
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Gemfile.lock-Datei hoch und wir sagen dir sofort, ob du betroffen bist.