class Dawn::Kb::CVE_2013_6421
Automatically created with rake on 2013-12-17
Public Class Methods
new()
click to toggle source
Calls superclass method
Dawn::Kb::DependencyCheck::new
# File lib/dawn/kb/cve_2013_6421.rb, line 7 def initialize message = "The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path." super({ :name=>'CVE-2013-6421', :cvss=>"AV:N/AC:L/Au:N/C:P/I:P/A:P", :release_date => Date.new(2013, 12, 12), :cwe=>"94", :owasp=>"A9", :applies=>["rails", "padrino", "sinatra"], :kind => Dawn::KnowledgeBase::DEPENDENCY_CHECK, :message => message, :mitigation=>"Please upgrade sprout rubygem", :aux_links => ["http://www.openwall.com/lists/oss-security/2013/12/03/1"] }) self.safe_dependencies = [{:name=>"sprout", :version=>['0.7.247']}] end