脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
Command injection in discordrb
脆弱性説明
discordrb is an implementation of the Discord API using Ruby. In discordrb before commit `91e13043ffa` the `encoder.rb` file unsafely constructs a shell string using the file parameter, which can potentially leave clients of discordrb vulnerable to command injection. The library is not directly exploitable: the exploit requires that some client of the library calls the vulnerable method with user input. However, if unsafe input reaches the library method, then an attacker can execute arbitrary shell commands on the host machine. Full impact will depend on the permissions of the process running the `discordrb` library and will likely not be total system access. This issue has been addressed in code, but a new release of the `discordrb` gem has not been uploaded to rubygems. This issue is also tracked as `GHSL-2022-094`.
CVSS情報
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
脆弱性タイプ
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
脆弱性タイトル
discordrb操作系统命令注入漏洞
脆弱性説明
discordrb是Shard Lab个人开发者的使用Ruby实现Discord API的存储库。 discordrb存在操作系统命令注入漏洞,该漏洞源于encoder.rb文件使用file参数不安全地构造了一个shell字符串,导致客户端容易受到命令注入攻击。
CVSS情報
N/A
脆弱性タイプ
N/A