CVE-2013-6421: sprout Arbitrary Code Execution vulnerability
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.78243%
CWE
Published
10/24/2017
Updated
11/5/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| sprout | rubygems | = 0.7.246 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability documentation explicitly identifies the unpack_zip function in archive_unpacker.rb as the source. The code uses %x() to execute a raw shell command with interpolated parameters derived from user inputs (zip_file and dir). File.expand_path and File.basename operations do not sanitize shell metacharacters, making the unzip command vulnerable to injection. Multiple sources (CVE, GHSA, and researcher analysis) confirm this pattern matches CWE-94 code injection.