Arbitrary Command Execution Affecting kajam package, versions >= 0
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-KAJAM-20171
- published 29 Jun 2014
- disclosed 29 Jun 2014
- credit Unknown
Overview
kajam
is a lightweight content management system for middle and small teams.
Affected versions of this gem are vulnerable to arbitrary command execution due to a flaw in /dataset/lib/dataset/database/postgresql.rb
that is triggered when handling metacharacters. This may allow a remote attacker to execute arbitrary commands.
References
CVSS Scores
version 3.1