CVE-2013-2512

The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
References
Link Resource
http://vapidlabs.com/advisory.php?v=34 Exploit Third Party Advisory
http://vapidlabs.com/advisory.php?v=34 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ftpd_project:ftpd:0.2.1:*:*:*:*:ruby:*:*

History

21 Nov 2024, 01:51

Type Values Removed Values Added
References () http://vapidlabs.com/advisory.php?v=34 - Exploit, Third Party Advisory () http://vapidlabs.com/advisory.php?v=34 - Exploit, Third Party Advisory

Information

Published : 2021-01-26 23:15

Updated : 2024-11-21 01:51


NVD link : CVE-2013-2512

Mitre link : CVE-2013-2512

CVE.ORG link : CVE-2013-2512


JSON object : View

Products Affected

ftpd_project

  • ftpd
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')