Arbitrary Command Injection Affecting festivaltts4r package, versions >=0.0.0


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.39% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-FESTIVALTTS4R-20358
  • published3 Apr 2017
  • disclosed21 Apr 2016
  • creditBrendan Coles

Introduced: 21 Apr 2016

CVE-2016-10194  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

There is no fix version for festivaltts4r.

Overview

festivaltts4r is a Text-to-speech for Ruby using festivaltts.

Affected versions of the package are vulnerable to Arbitrary Command Injection. User input is passed as an argument in the to_speech and to_mp3 methods, allowing a malicious user to run arbitrary code or see environment variables.

CVSS Scores

version 3.1