Arbitrary Code Execution Vulnerability in RDoc by Ruby
CVE-2021-31799
7HIGH
Summary
In RDoc versions 3.11 through 6.x prior to 6.3.1, bundled with Ruby 3.0.1, an attacker can exploit the ability to include special characters such as | and tags in filenames, leading to the possibility of arbitrary code execution. This vulnerability allows unauthorized operations to be executed on the system, potentially compromising the security of the application using RDoc.
References
CVSS V3.1
Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved