Arbitrary Code Execution Affecting redis-namespace package, versions <1.0.4 >=1.1, <1.1.1 >=1.2, <1.2.2 >=1.3, <1.3.1


0.0
high

Snyk CVSS

    Attack Complexity Low
    Scope Changed

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUBY-REDISNAMESPACE-20105
  • published 2 Aug 2013
  • disclosed 2 Aug 2013
  • credit Steve Klabnik

Introduced: 2 Aug 2013

CVE NOT AVAILABLE CWE-94 Open this link in a new tab

How to fix?

Upgrade redis-namespace to version 1.0.4, 1.1.1, 1.2.2, 1.3.1 or higher.

Overview

redis-namespace is a gem that adds a Redis::Namespace class which can be used to namespace calls to Redis.

Affected versions of this package are vulnerable to Arbitrary Code Execution. Affected versions contains a flaw in the method_missing implementation. The issue is triggered when handling exec commands called via send(). This may allow a remote attacker to execute arbitrary commands.