
We found results for “”
CVE-2020-8130
Good to know:

Date: February 24, 2020
There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
Language: Ruby
Severity Score
Related Resources (15)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-78Top Fix

Upgrade Version
Upgrade to version PactNet-Linux-x64 - no_fix;rake - 12.3.3;PactNet.OSX - no_fix;PactNet-OSX - no_fix;files.com/files-php-sdk - v1.0.7;logstash-binary - no_fix;PactNet.Linux.x86 - no_fix;ruby - 2.7.0;PactNet - 2.0.8-beta;PactNet.Windows - no_fix;PactNet-Windows - no_fix;PactNet.Linux.x64 - no_fix;PactNet-Linux-x86 - no_fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | HIGH |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | LOCAL |
Access Complexity (AC): | MEDIUM |
Authentication (AU): | NONE |
Confidentiality (C): | COMPLETE |
Integrity (I): | COMPLETE |
Availability (A): | COMPLETE |
Additional information: |