Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade discordrb
to version 3.5.0 or higher.
Affected versions of this package are vulnerable to Command Injection such that the encoder.rb
file unsafely constructs a shell string using the file parameter, which can potentially leave clients of discordrb vulnerable to command injection.
Note: The library is not directly exploitable: the exploit requires that some client of the library calls the vulnerable method with user input. However, if unsafe input reaches the library method, then an attacker can execute arbitrary shell commands on the host machine. Full impact will depend on the permissions of the process running the discordrb
library and will likely not be total system access.
touch pwned
)ffmpeg_command = "foo" # unrelated options = "" # unrelated filter_volume_argument = "bar" # unrelated
file = "touch pwned
"
command = "#{ffmpeg_command} -loglevel 0 -i "#{file}" #{options} -f s16le -ar 48000 -ac 2 #{filter_volume_argument} pipe:1" IO.popen(command) ```