Description
There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2120-1 | rake security update |
EUVD |
EUVD-2020-0305 | There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`. |
Github GHSA |
GHSA-jppv-gw3r-w3q8 | OS Command Injection in Rake |
Ubuntu USN |
USN-4295-1 | Rake vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-04T09:48:25.624Z
Reserved: 2020-01-28T00:00:00.000Z
Link: CVE-2020-8130
No data.
Status : Modified
Published: 2020-02-24T15:15:11.957
Modified: 2024-11-21T05:38:21.133
Link: CVE-2020-8130
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN