Arbitrary Code Execution Affecting redis-namespace package, versions <1.0.4 >=1.1, <1.1.1 >=1.2, <1.2.2 >=1.3, <1.3.1
Snyk CVSS
Attack Complexity
Low
Scope
Changed
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-REDISNAMESPACE-20105
- published 2 Aug 2013
- disclosed 2 Aug 2013
- credit Steve Klabnik
How to fix?
Upgrade redis-namespace
to version 1.0.4, 1.1.1, 1.2.2, 1.3.1 or higher.
Overview
redis-namespace is a gem that adds a Redis::Namespace
class which can be used to namespace calls to Redis.
Affected versions of this package are vulnerable to Arbitrary Code Execution. Affected versions contains a flaw in the method_missing implementation. The issue is triggered when handling exec
commands called via send()
. This may allow a remote attacker to execute arbitrary commands.