CVE-2013-4203: rgpg Code Injection vulnerability
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.79685%
CWE
Published
10/24/2017
Updated
11/5/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
rgpg | rubygems | < 0.2.3 | 0.2.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- Multiple sources (CVE description, GHSA, Openwall discussion) explicitly name GpgHelper.run_gpg as the vulnerable function.
- The code pattern matches classic command injection - unsanitized user input passed directly to system() with shell operators.
- The vulnerability was patched in 0.2.3, and historical context shows Ruby security advisories typically address this type of system() call misuse.