Advisories for Gem/Espeak-Ruby package

2017

Remote Code Execution Vulnerability

The gem passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to the speak, save, bytes and bytes_wav methods in the lib/espeak/speech.rb library.