CVE-2013-1756:
Dragonfly Code Injection vulnerability
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.82769%
CWE
Published
10/24/2017
Updated
11/10/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
dragonfly | rubygems | >= 0.7, < 0.8.6 | 0.8.6 |
dragonfly | rubygems | >= 0.9, < 0.9.13 | 0.9.13 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided commit diff (a8775aa) only modifies the README.md file and does not show code changes related to the vulnerability. The actual patched code changes are not included in the provided data, making it impossible to identify specific vulnerable functions with high confidence. Code injection vulnerabilities in Ruby often involve unsafe input handling (e.g., eval, system calls), but without seeing the pre-patch implementation details or security-focused diffs, we cannot definitively pinpoint the affected functions. The advisory descriptions confirm the vulnerability exists in processing crafted requests but lack technical specifics about the flawed code paths.