CVE-2023-28102: discordrb OS Command Injection vulnerability
9.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.73369%
CWE
Published
3/14/2024
Updated
3/14/2024
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
discordrb | rubygems | < 3.4.3 | 3.4.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from constructing shell commands via unsafe string interpolation in encode_file and encode_io methods. The commit diff shows both methods were modified to use an array-based invocation (safe) instead of string interpolation (unsafe). The original implementation in encoder.rb line 80/90 directly interpolated user-controlled parameters into command strings passed to IO.popen, making them vulnerable to command injection. The CVE description and patch commit confirm these were the vulnerable entry points.