CVE-2013-4478: Improper Control of Generation of Code ('Code Injection')
(updated )
Sup allows remote attackers to execute arbitrary commands via shell metacharacters in the filename of an email attachment.
References
- rubyforge.org/pipermail/sup-talk/2013-August/004993.html
- rubyforge.org/pipermail/sup-talk/2013-October/004996.html
- secunia.com/advisories/55294
- secunia.com/advisories/55400
- www.debian.org/security/2012/dsa-2805
- www.openwall.com/lists/oss-security/2013/10/30/2
- github.com/sup-heliotrope/sup/commit/8b46cdbfc14e07ca07d403aa28b0e7bc1c544785
- nvd.nist.gov/vuln/detail/CVE-2013-4478
Detect and mitigate CVE-2013-4478 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →