Miggo Logo

CVE-2013-5647: Sounder Contains Arbitrary Command Execution Vulnerability

7.5

CVSS Score

Basic Information

EPSS Score
0.8178%
Published
10/24/2017
Updated
11/6/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
sounderrubygems< 1.0.21.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability occurs in the play method where user-supplied filename (@file) is directly embedded into a system() call using string interpolation. This allows attackers to inject arbitrary commands via shell metacharacters. The PoC demonstrates command execution by including ';' in the filename. The system call uses a single string argument which invokes shell interpretation, making it vulnerable to injection. The code structure matches classic command injection patterns (CWE-94).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

li*/soun**r/soun*.r* in t** soun**r **m *.*.* *or Ru*y *llows r*mot* *tt**k*rs to *x**ut* *r*itr*ry *omm*n*s vi* s**ll m*t****r**t*rs in * *il*n*m*.

Reasoning

T** vuln*r**ility o**urs in t** pl*y m*t*o* w**r* us*r-suppli** `*il*n*m*` (@*il*) is *ir**tly *m****** into * `syst*m()` **ll usin* strin* int*rpol*tion. T*is *llows *tt**k*rs to inj**t *r*itr*ry *omm*n*s vi* s**ll m*t****r**t*rs. T** Po* **monstr*t