The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2017/01/31/14 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/02/02/5 | Mailing List Patch Third Party Advisory |
https://github.com/dejan/espeak-ruby/issues/7 | Mailing List Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-03-03 15:59
Updated : 2024-02-28 15:44
NVD link : CVE-2016-10193
Mitre link : CVE-2016-10193
CVE.ORG link : CVE-2016-10193
JSON object : View
Products Affected
espeak-ruby_project
- espeak-ruby
CWE
CWE-284
Improper Access Control