smalruby-editor v0.4.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN50197114/index.html | Third Party Advisory VDB Entry |
http://smalruby.jp/blog/2017/01/14/smalruby-editor-0-4-1-has-been-released-english.html | Release Notes Vendor Advisory |
http://www.securityfocus.com/bid/95775 | Third Party Advisory VDB Entry |
http://jvn.jp/en/jp/JVN50197114/index.html | Third Party Advisory VDB Entry |
http://smalruby.jp/blog/2017/01/14/smalruby-editor-0-4-1-has-been-released-english.html | Release Notes Vendor Advisory |
http://www.securityfocus.com/bid/95775 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN50197114/index.html - Third Party Advisory, VDB Entry | |
References | () http://smalruby.jp/blog/2017/01/14/smalruby-editor-0-4-1-has-been-released-english.html - Release Notes, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/95775 - Third Party Advisory, VDB Entry |
Information
Published : 2017-04-28 16:59
Updated : 2024-11-21 03:22
NVD link : CVE-2017-2096
Mitre link : CVE-2017-2096
CVE.ORG link : CVE-2017-2096
JSON object : View
Products Affected
smalruby
- smalruby-editor
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')