CVE-2013-1933 in karteek-docsplitinfo

Summary

The extract_from_ocr function in lib/docsplit/text_extractor.rb in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Reservation

02/19/2013

Disclosure

04/25/2013

Entries

1: VDB-64027

CPE

ready

CVSS

9.8

EPSS

0.02836

Activities

Very Low

Sources

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!