Arbitrary Code Execution Affecting redis-namespace package, versions <1.0.4>=1.1, <1.1.1>=1.2, <1.2.2>=1.3, <1.3.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-REDISNAMESPACE-20105
  • published2 Aug 2013
  • disclosed2 Aug 2013
  • creditSteve Klabnik

Introduced: 2 Aug 2013

CVE NOT AVAILABLE CWE-94  (opens in a new tab)

How to fix?

Upgrade redis-namespace to version 1.0.4, 1.1.1, 1.2.2, 1.3.1 or higher.

Overview

redis-namespace is a gem that adds a Redis::Namespace class which can be used to namespace calls to Redis.

Affected versions of this package are vulnerable to Arbitrary Code Execution. Affected versions contains a flaw in the method_missing implementation. The issue is triggered when handling exec commands called via send(). This may allow a remote attacker to execute arbitrary commands.

CVSS Scores

version 3.1