Skip to content

Commit 395ee75

Browse files
author
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@8759445
1 parent f984ac6 commit 395ee75

File tree

5 files changed

+90
-1
lines changed

5 files changed

+90
-1
lines changed
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2015-8968 (git-fastclone): git-fastclone permits arbitrary shell command
4+
execution from .gitmodules'
5+
comments: false
6+
categories:
7+
- git-fastclone
8+
advisory:
9+
gem: git-fastclone
10+
cve: 2015-8968
11+
url: https://hackerone.com/reports/104465
12+
title: git-fastclone permits arbitrary shell command execution from .gitmodules
13+
date: 2015-12-11
14+
description: |
15+
Git allows executing arbitrary shell commands using git-remote-ext via a
16+
remote URLs. Normally git never requests URLs that the user doesn't
17+
specifically request, so this is not a serious security concern. However,
18+
submodules did allow the remote repository to specify what URL to clone
19+
from.
20+
21+
If an attacker can instruct a user to run a recursive clone from a
22+
repository they control, they can get a client to run an arbitrary shell
23+
command. Alternately, if an attacker can MITM an unencrypted git clone,
24+
they could exploit this. The ext command will be run if the repository is
25+
recursively cloned or if submodules are updated. This attack works when
26+
cloning both local and remote repositories.
27+
patched_versions:
28+
- ">= 1.0.1"
29+
---
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2015-8969 (git-fastclone): git-fastclone Shell Metacharacter Injection
4+
Arbitrary Command Execution'
5+
comments: false
6+
categories:
7+
- git-fastclone
8+
advisory:
9+
gem: git-fastclone
10+
cve: 2015-8969
11+
url: https://hackerone.com/reports/105190
12+
title: git-fastclone Shell Metacharacter Injection Arbitrary Command Execution
13+
date: 2015-12-15
14+
description: |
15+
git-fastclone before 1.0.5 passes user modifiable strings directly to a shell
16+
command. An attacker can execute malicious commands by modifying the strings
17+
that are passed as arguments to "cd " and "git clone " commands in the
18+
library.
19+
patched_versions:
20+
- ">= 1.0.5"
21+
---
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2016-10193 (espeak-ruby): espeak-ruby Gem for Ruby Arbitrary Command Execution'
4+
comments: false
5+
categories:
6+
- espeak-ruby
7+
advisory:
8+
cve: 2016-10193
9+
gem: espeak-ruby
10+
url: https://github.com/dejan/espeak-ruby/issues/7
11+
title: espeak-ruby Gem for Ruby Arbitrary Command Execution
12+
date: 2016-04-13
13+
description: |
14+
espeak-ruby passes user modifiable strings directly to a shell
15+
command. An attacker can execute malicious commands by modifying
16+
the strings that are passed as arguments to the speak, save, bytes
17+
and bytes_wav methods in the lib/espeak/speech.rb library.
18+
patched_versions:
19+
- ">= 1.0.3"
20+
---
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2016-10194 (festivaltts4r): festivaltts4r Gem for Ruby Arbitrary Command
4+
Execution'
5+
comments: false
6+
categories:
7+
- festivaltts4r
8+
advisory:
9+
cve: 2016-10194
10+
gem: festivaltts4r
11+
url: https://github.com/spejman/festivaltts4r/issues/1
12+
title: festivaltts4r Gem for Ruby Arbitrary Command Execution
13+
date: 2016-04-23
14+
description: |
15+
festivaltts4r passes user modifiable strings directly to a shell
16+
command. An attacker can execute malicious commands by modifying
17+
the strings that are passed as arguments to the to_speech and
18+
and to_mp3 methods in lib/festivaltts4r/festival4r.rb library.
19+
---

advisories/_posts/2016-08-22-CVE-2016-10173.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,5 +19,5 @@ advisory:
1919
2020
Credit: ecneladis
2121
patched_versions:
22-
- ">= 0.6"
22+
- ">= 0.6.1"
2323
---

0 commit comments

Comments
 (0)